General

  • Target

    7f4ee2df4db93ba993748531ae3fa241.exe

  • Size

    6.0MB

  • Sample

    220818-ey8j7sccb5

  • MD5

    7f4ee2df4db93ba993748531ae3fa241

  • SHA1

    ed33ba6de8beb198f61a7f629828378eb90426c2

  • SHA256

    ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

  • SHA512

    a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

  • SSDEEP

    98304:TXz+SO1rRfq9vaAA6eGeZ4FnEW1wjEdGUhQq4Cu/XjB3PcwSbBT6TTCSYG7rw1Ol:jKSO/fq9yAA6ektHqjWGUnUfcTBOTTCo

Malware Config

Targets

    • Target

      7f4ee2df4db93ba993748531ae3fa241.exe

    • Size

      6.0MB

    • MD5

      7f4ee2df4db93ba993748531ae3fa241

    • SHA1

      ed33ba6de8beb198f61a7f629828378eb90426c2

    • SHA256

      ffda77db26e59f2a8a8e1db7615b94ed1e8b2c19b6ff89c0295ff3a744378911

    • SHA512

      a4b8e5ecb2a015eb2bcf9e431add61c432d17fe5633d5d29c4d1c8268ab85f09aa40716bd2312d2459f783856671ec20de06053399d3cb41fba1932f7ac26028

    • SSDEEP

      98304:TXz+SO1rRfq9vaAA6eGeZ4FnEW1wjEdGUhQq4Cu/XjB3PcwSbBT6TTCSYG7rw1Ol:jKSO/fq9yAA6ektHqjWGUnUfcTBOTTCo

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks