General

  • Target

    $77_loader.exe

  • Size

    397KB

  • Sample

    220512-tq64qsbec2

  • MD5

    aff57ee1a4f3731c2036046910f78fb4

  • SHA1

    ef9627c0cadff85a3dfaab6aef0b7c885f03b186

  • SHA256

    3826953ded758361f9783d67242e4ba87092d637d72bcf81c649e52665c57de4

  • SHA512

    5ae93c6dae61782a7ac2fa2079df7006e0655d73e32fd7df1a5c1d44e47fd7dd2da225ea6f93e9d3dcb09be5f84b5dab2130bb4f2d5b0e05d95e866ebde0163f

Malware Config

Targets

    • Target

      $77_loader.exe

    • Size

      397KB

    • MD5

      aff57ee1a4f3731c2036046910f78fb4

    • SHA1

      ef9627c0cadff85a3dfaab6aef0b7c885f03b186

    • SHA256

      3826953ded758361f9783d67242e4ba87092d637d72bcf81c649e52665c57de4

    • SHA512

      5ae93c6dae61782a7ac2fa2079df7006e0655d73e32fd7df1a5c1d44e47fd7dd2da225ea6f93e9d3dcb09be5f84b5dab2130bb4f2d5b0e05d95e866ebde0163f

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Sets file execution options in registry

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Modifies WinLogon

    • Modifies powershell logging option

MITRE ATT&CK Enterprise v6

Tasks