General

  • Target

    5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520

  • Size

    2.3MB

  • Sample

    221122-xe42sagg9z

  • MD5

    f9a70b66ff579dc6e00109eb5d48055e

  • SHA1

    4337646a6b0d12f8732e5b20003cc999852e3f62

  • SHA256

    5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520

  • SHA512

    782086b98f6c3c296716fa4178170302c56a2fff512e34e9efc724d1eb1108fa7e58e7c1e30425de91aae718c966819e5aa716e4cedad4778d5bf2d6dffec306

  • SSDEEP

    49152:RLfmMc8EjGCbKeaoK94jmPBLeL7gBfi/4gXkc/hbHorCUm0fV:RLfm382GCbKeWyjUBLL2dT/xoWUf

Malware Config

Targets

    • Target

      5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520

    • Size

      2.3MB

    • MD5

      f9a70b66ff579dc6e00109eb5d48055e

    • SHA1

      4337646a6b0d12f8732e5b20003cc999852e3f62

    • SHA256

      5cd9f9e3744daa7ecd4479f483124cc269e827c8acc96271e1f1ea2023afa520

    • SHA512

      782086b98f6c3c296716fa4178170302c56a2fff512e34e9efc724d1eb1108fa7e58e7c1e30425de91aae718c966819e5aa716e4cedad4778d5bf2d6dffec306

    • SSDEEP

      49152:RLfmMc8EjGCbKeaoK94jmPBLeL7gBfi/4gXkc/hbHorCUm0fV:RLfm382GCbKeWyjUBLL2dT/xoWUf

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks