General

  • Target

    63119ab29e258e4828893f60f39cf278e2a4e69fd1886ee71e14b98091b4d443

  • Size

    8.2MB

  • Sample

    220417-hw3gysabam

  • MD5

    023821ea8f7c3745a2542de96753804b

  • SHA1

    37ec844e943d934527cf51aaf5f31cadbcde6548

  • SHA256

    63119ab29e258e4828893f60f39cf278e2a4e69fd1886ee71e14b98091b4d443

  • SHA512

    ca4405e02e7040caa339355aa485ab3c5bf13d3a2db3cdc5e442b0ea610d418d5ca81fddfc9ef0b1f59630baff16edc06747b5010bf0991cbd8b35114193eb41

Malware Config

Targets

    • Target

      63119ab29e258e4828893f60f39cf278e2a4e69fd1886ee71e14b98091b4d443

    • Size

      8.2MB

    • MD5

      023821ea8f7c3745a2542de96753804b

    • SHA1

      37ec844e943d934527cf51aaf5f31cadbcde6548

    • SHA256

      63119ab29e258e4828893f60f39cf278e2a4e69fd1886ee71e14b98091b4d443

    • SHA512

      ca4405e02e7040caa339355aa485ab3c5bf13d3a2db3cdc5e442b0ea610d418d5ca81fddfc9ef0b1f59630baff16edc06747b5010bf0991cbd8b35114193eb41

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Drops file in Drivers directory

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for any installed AV software in registry

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks