General

  • Target

    8c13bccbda4ac9cd36d52a8205e7068834a51989ed55bd152cacca38ca1ec2fc

  • Size

    4.8MB

  • Sample

    220524-sak1wsfcc4

  • MD5

    4a5f2f1f3f38fc6e3c9b6a746e1e0857

  • SHA1

    2d8aaea4b525b475e66679d1b0e498a6c003b72e

  • SHA256

    8c13bccbda4ac9cd36d52a8205e7068834a51989ed55bd152cacca38ca1ec2fc

  • SHA512

    2d79d6832f54615e57cfeff55d7796626df3f7d4674432fd4396286efcb8e51d8f95e12eef5963c7d03935f1b651ee39e75e6465481e4370d84682ef5644e345

Malware Config

Targets

    • Target

      8c13bccbda4ac9cd36d52a8205e7068834a51989ed55bd152cacca38ca1ec2fc

    • Size

      4.8MB

    • MD5

      4a5f2f1f3f38fc6e3c9b6a746e1e0857

    • SHA1

      2d8aaea4b525b475e66679d1b0e498a6c003b72e

    • SHA256

      8c13bccbda4ac9cd36d52a8205e7068834a51989ed55bd152cacca38ca1ec2fc

    • SHA512

      2d79d6832f54615e57cfeff55d7796626df3f7d4674432fd4396286efcb8e51d8f95e12eef5963c7d03935f1b651ee39e75e6465481e4370d84682ef5644e345

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

      suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks