General

  • Target

    8d8f019f32507c4ec691134917a4ac5b20cb949613d336a503e7701ed42a199e

  • Size

    16.3MB

  • Sample

    220330-a2q24sddh8

  • MD5

    bd923d4a0630996ab6c799bf38c0b0d1

  • SHA1

    6a2b161d8d90d02c8035a60aff194d0c403f59b7

  • SHA256

    8d8f019f32507c4ec691134917a4ac5b20cb949613d336a503e7701ed42a199e

  • SHA512

    d198bed9da093d1affe1fa1e435bb639cadbc64c943e3a4069d6b1849126679148989e9ea5887a10d28dbd0f281652a911cca6f67b9a818ca240146a1c68d261

Malware Config

Targets

    • Target

      8d8f019f32507c4ec691134917a4ac5b20cb949613d336a503e7701ed42a199e

    • Size

      16.3MB

    • MD5

      bd923d4a0630996ab6c799bf38c0b0d1

    • SHA1

      6a2b161d8d90d02c8035a60aff194d0c403f59b7

    • SHA256

      8d8f019f32507c4ec691134917a4ac5b20cb949613d336a503e7701ed42a199e

    • SHA512

      d198bed9da093d1affe1fa1e435bb639cadbc64c943e3a4069d6b1849126679148989e9ea5887a10d28dbd0f281652a911cca6f67b9a818ca240146a1c68d261

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • UAC bypass

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks