General

  • Target

    a7bf090c6c00f0ed0aaaf53aa84ef1c08a2a85a59e4f3cc7d447178f284429dd

  • Size

    14.6MB

  • Sample

    220128-xsjyrsbahm

  • MD5

    c4890d57d4156c67975949591292e636

  • SHA1

    f9b5e4bda938ca6caa483954ae898fed96b21892

  • SHA256

    a7bf090c6c00f0ed0aaaf53aa84ef1c08a2a85a59e4f3cc7d447178f284429dd

  • SHA512

    b3680886615dbd586a77c8a9006de6df71710fb23f16d44450073234b8b5579ea01439bc9e81847baf6940f4eccf1a875135a6863e8de8e02d1fafb5316390dd

Malware Config

Targets

    • Target

      a7bf090c6c00f0ed0aaaf53aa84ef1c08a2a85a59e4f3cc7d447178f284429dd

    • Size

      14.6MB

    • MD5

      c4890d57d4156c67975949591292e636

    • SHA1

      f9b5e4bda938ca6caa483954ae898fed96b21892

    • SHA256

      a7bf090c6c00f0ed0aaaf53aa84ef1c08a2a85a59e4f3cc7d447178f284429dd

    • SHA512

      b3680886615dbd586a77c8a9006de6df71710fb23f16d44450073234b8b5579ea01439bc9e81847baf6940f4eccf1a875135a6863e8de8e02d1fafb5316390dd

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • UAC bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks