General

  • Target

    8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382

  • Size

    29.6MB

  • Sample

    220724-vj15ksbfg5

  • MD5

    87e9ef77d9eae3a947a8922acf8179d4

  • SHA1

    064167fa469d978df5fd2f1963d4bbb94c341e87

  • SHA256

    8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382

  • SHA512

    4bbbe4f6fc0cf1fbe1ae30d3f1fe9356b5bdb08ef60dbecca42e32c3d6208b47db9c9087c1542f5f21c1f8a7a0e4951f2e7cc13f4fd336aed2fb3ca99cf487bf

Malware Config

Targets

    • Target

      8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382

    • Size

      29.6MB

    • MD5

      87e9ef77d9eae3a947a8922acf8179d4

    • SHA1

      064167fa469d978df5fd2f1963d4bbb94c341e87

    • SHA256

      8a487b244c55599fed414d7a3e448f63a100cd49df9f5464688c9eddd6dbd382

    • SHA512

      4bbbe4f6fc0cf1fbe1ae30d3f1fe9356b5bdb08ef60dbecca42e32c3d6208b47db9c9087c1542f5f21c1f8a7a0e4951f2e7cc13f4fd336aed2fb3ca99cf487bf

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • UAC bypass

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

System Information Discovery

3
T1082

Collection

Data from Local System

2
T1005

Tasks