General

  • Target

    3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f

  • Size

    4.8MB

  • Sample

    220703-j9wr1abhak

  • MD5

    aa631cb4aa034b7ab6898b238fd14afe

  • SHA1

    2b3aab346fa40df68e3ccd7bd50d7fb1c0ac4c14

  • SHA256

    3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f

  • SHA512

    2205a82bd3e3d2438d5f78432eba0d9bc7fe281307594e41a14e8a514ce26242762207374c8591238d1d67c7fe6625cb6fc18b6b40cf36be8be9ca01cba077b0

Malware Config

Targets

    • Target

      3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f

    • Size

      4.8MB

    • MD5

      aa631cb4aa034b7ab6898b238fd14afe

    • SHA1

      2b3aab346fa40df68e3ccd7bd50d7fb1c0ac4c14

    • SHA256

      3c2c66b88b34ee69f3d8fe88171b0f4661765b99586c3780ed27ba8098deaa3f

    • SHA512

      2205a82bd3e3d2438d5f78432eba0d9bc7fe281307594e41a14e8a514ce26242762207374c8591238d1d67c7fe6625cb6fc18b6b40cf36be8be9ca01cba077b0

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks