General

  • Target

    cb7f487a64b11b3eb26e0f597b2c195835285850a24c23b6534d4d6d8d67af6c

  • Size

    7.0MB

  • Sample

    220213-mftx4aggf7

  • MD5

    48cfce9208c54152ff881406ffbd537a

  • SHA1

    04dacfa4e3a9e2dd57f4cab92a8d11b9e6ee4901

  • SHA256

    cb7f487a64b11b3eb26e0f597b2c195835285850a24c23b6534d4d6d8d67af6c

  • SHA512

    2505c1d48373fbf7ddc708a8b5b912028edec94abbea4b103d37b3e240d12582c31f846caebc378f69ec5a06e7e9387b93184edd1edf5e90b50fd072716f2dc0

Malware Config

Targets

    • Target

      cb7f487a64b11b3eb26e0f597b2c195835285850a24c23b6534d4d6d8d67af6c

    • Size

      7.0MB

    • MD5

      48cfce9208c54152ff881406ffbd537a

    • SHA1

      04dacfa4e3a9e2dd57f4cab92a8d11b9e6ee4901

    • SHA256

      cb7f487a64b11b3eb26e0f597b2c195835285850a24c23b6534d4d6d8d67af6c

    • SHA512

      2505c1d48373fbf7ddc708a8b5b912028edec94abbea4b103d37b3e240d12582c31f846caebc378f69ec5a06e7e9387b93184edd1edf5e90b50fd072716f2dc0

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • UAC bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Allows Network login with blank passwords

      Allows local user accounts with blank passwords to access device from the network.

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks