General

  • Target

    b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6

  • Size

    4.7MB

  • Sample

    220314-wgn8nsafb2

  • MD5

    07df176023a74870f154494e50cf1a4c

  • SHA1

    2ccd182a1b76b64e93d8fe1bb76c9d7956651a87

  • SHA256

    b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6

  • SHA512

    e8b00a91a0e9b69988c7673c32a97cc05569862f406f526e13aaa808686c44a866ceded9e56d8bc7bd96739ac9c7f2ceec1e9e88ac16fe5104faeefb10cc0bab

Malware Config

Targets

    • Target

      b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6

    • Size

      4.7MB

    • MD5

      07df176023a74870f154494e50cf1a4c

    • SHA1

      2ccd182a1b76b64e93d8fe1bb76c9d7956651a87

    • SHA256

      b70329c243528e0b6c689b3979bd5921eba413d80f713f529daaad5a02ce8cf6

    • SHA512

      e8b00a91a0e9b69988c7673c32a97cc05569862f406f526e13aaa808686c44a866ceded9e56d8bc7bd96739ac9c7f2ceec1e9e88ac16fe5104faeefb10cc0bab

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks