General

  • Target

    63fc0794aa0d204c998e265c7232504db2d2fad803b4d64f39fcc01f4d2c246f

  • Size

    7.3MB

  • Sample

    221122-ajmlzafh7x

  • MD5

    cbe8cccf510aebb3a7dff02212d2355a

  • SHA1

    001d1eed2ef3b9a385b5277e7a3cc409eb602013

  • SHA256

    63fc0794aa0d204c998e265c7232504db2d2fad803b4d64f39fcc01f4d2c246f

  • SHA512

    073b241b6d6a449b23145c3553de8d974e385fb27fb7e62e7545962d2044aae4010822f7886c55617e9b02e41fa3ecd4b237fadcd76f2421a8365d1d961b44b5

  • SSDEEP

    196608:fbUKcyFuAakzfaCk2Pi6vClmFMaq857NoMKikh:fbUYjCuc0MaV57No4U

Score
10/10

Malware Config

Targets

    • Target

      63fc0794aa0d204c998e265c7232504db2d2fad803b4d64f39fcc01f4d2c246f

    • Size

      7.3MB

    • MD5

      cbe8cccf510aebb3a7dff02212d2355a

    • SHA1

      001d1eed2ef3b9a385b5277e7a3cc409eb602013

    • SHA256

      63fc0794aa0d204c998e265c7232504db2d2fad803b4d64f39fcc01f4d2c246f

    • SHA512

      073b241b6d6a449b23145c3553de8d974e385fb27fb7e62e7545962d2044aae4010822f7886c55617e9b02e41fa3ecd4b237fadcd76f2421a8365d1d961b44b5

    • SSDEEP

      196608:fbUKcyFuAakzfaCk2Pi6vClmFMaq857NoMKikh:fbUYjCuc0MaV57No4U

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Blocklisted process makes network request

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Hidden Files and Directories

1
T1158

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks