General

  • Target

    372b18086703b41341808ccbf0be39c92096c8b6da75d1d471b1ebe995f7ab85

  • Size

    3.5MB

  • Sample

    221029-rdms8aaad6

  • MD5

    24629ece9cd7382f51684c7eedef355d

  • SHA1

    48431b63b6abf79d05bc729bfb61852e119c1714

  • SHA256

    372b18086703b41341808ccbf0be39c92096c8b6da75d1d471b1ebe995f7ab85

  • SHA512

    7794f7ca424e856fcc12e7a08bd93e444d591a09200010caf85d2bf1be097258e0a2aa47d1f3d2e831c2e23c989c6ee10ff9f4bce4f191648a7fe76037bed3ba

  • SSDEEP

    49152:1bSO/Zb2GmSUMrVYrrNheDzuKGTsztBsapHQLTSjNQeb35pnoQcSlsKUF+ikZ:EuZK8f+vNOmT0psSpppUKUg9Z

Malware Config

Targets

    • Target

      372b18086703b41341808ccbf0be39c92096c8b6da75d1d471b1ebe995f7ab85

    • Size

      3.5MB

    • MD5

      24629ece9cd7382f51684c7eedef355d

    • SHA1

      48431b63b6abf79d05bc729bfb61852e119c1714

    • SHA256

      372b18086703b41341808ccbf0be39c92096c8b6da75d1d471b1ebe995f7ab85

    • SHA512

      7794f7ca424e856fcc12e7a08bd93e444d591a09200010caf85d2bf1be097258e0a2aa47d1f3d2e831c2e23c989c6ee10ff9f4bce4f191648a7fe76037bed3ba

    • SSDEEP

      49152:1bSO/Zb2GmSUMrVYrrNheDzuKGTsztBsapHQLTSjNQeb35pnoQcSlsKUF+ikZ:EuZK8f+vNOmT0psSpppUKUg9Z

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Modify Existing Service

1
T1031

Defense Evasion

Hidden Files and Directories

2
T1158

Impair Defenses

1
T1562

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks