General

  • Target

    fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3

  • Size

    7.3MB

  • Sample

    221003-3mpjysceb4

  • MD5

    6b6702acef95453426afa2f1d2520bb2

  • SHA1

    47293a57769289aa4070f04f22f7d9fcc77c9682

  • SHA256

    fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3

  • SHA512

    e93652d097c7cb45c46acb5926cf59ad87741ee9a795c4294d4bbed43827aecde27e34520102da717073d4a197b6c5d4addd581ee2ae7c4020f5415cb93f9c5c

  • SSDEEP

    196608:W15XKNCDOtv1BCkrxlpJ8EAnOsjnkrciwzSQ2Y:WrXov6sxDiEAOsjo2X2Y

Malware Config

Targets

    • Target

      fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3

    • Size

      7.3MB

    • MD5

      6b6702acef95453426afa2f1d2520bb2

    • SHA1

      47293a57769289aa4070f04f22f7d9fcc77c9682

    • SHA256

      fb2c0262656d101b084eecc059653b938081a6a812197d2c6c8f7582f946c3e3

    • SHA512

      e93652d097c7cb45c46acb5926cf59ad87741ee9a795c4294d4bbed43827aecde27e34520102da717073d4a197b6c5d4addd581ee2ae7c4020f5415cb93f9c5c

    • SSDEEP

      196608:W15XKNCDOtv1BCkrxlpJ8EAnOsjnkrciwzSQ2Y:WrXov6sxDiEAOsjo2X2Y

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Registers new Print Monitor

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Hidden Files and Directories

1
T1158

Defense Evasion

Modify Registry

1
T1112

Hidden Files and Directories

1
T1158

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Peripheral Device Discovery

2
T1120

Remote System Discovery

1
T1018

Tasks