General

  • Target

    b93f06715dbac64a7d43fd7014af9eca8baf2f6b9082318fdb0d1c13f88c238e

  • Size

    16.3MB

  • Sample

    220329-yyg7ssafh5

  • MD5

    1135af60ec182f12b47d863693b523d2

  • SHA1

    37b2499d55e1be5f09ec1e7e52736aa06a9d3ece

  • SHA256

    b93f06715dbac64a7d43fd7014af9eca8baf2f6b9082318fdb0d1c13f88c238e

  • SHA512

    1272753edb49149a8e1eed01da1775eaf63c8597a964427f4f9548e2ca934e159acd2b069c0d3beae851d8e8189a59d7c49aac459e67f79cc3b98e5e73ef0cc4

Malware Config

Targets

    • Target

      b93f06715dbac64a7d43fd7014af9eca8baf2f6b9082318fdb0d1c13f88c238e

    • Size

      16.3MB

    • MD5

      1135af60ec182f12b47d863693b523d2

    • SHA1

      37b2499d55e1be5f09ec1e7e52736aa06a9d3ece

    • SHA256

      b93f06715dbac64a7d43fd7014af9eca8baf2f6b9082318fdb0d1c13f88c238e

    • SHA512

      1272753edb49149a8e1eed01da1775eaf63c8597a964427f4f9548e2ca934e159acd2b069c0d3beae851d8e8189a59d7c49aac459e67f79cc3b98e5e73ef0cc4

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • UAC bypass

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks