General

  • Target

    8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec

  • Size

    5.0MB

  • Sample

    220309-v8dqkseaer

  • MD5

    06f4968bbe4bc2595432073659abdb12

  • SHA1

    89e4f5a320643818011c0c22017a866f6fe0198f

  • SHA256

    8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec

  • SHA512

    f15f337793f58ead1817c68d3cecf6189d6027773707a96733ab6c93591f9e286eac28274cba3ee8d86a2b6309ce5b479233fd4372b1c0ff8fb64307c3a8d9b9

Score
10/10

Malware Config

Targets

    • Target

      8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec

    • Size

      5.0MB

    • MD5

      06f4968bbe4bc2595432073659abdb12

    • SHA1

      89e4f5a320643818011c0c22017a866f6fe0198f

    • SHA256

      8f4a0a1c651b7e50efb2883b1f8392771b5c36553127b3a216ed3a483cef0dec

    • SHA512

      f15f337793f58ead1817c68d3cecf6189d6027773707a96733ab6c93591f9e286eac28274cba3ee8d86a2b6309ce5b479233fd4372b1c0ff8fb64307c3a8d9b9

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • UAC bypass

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks