General

  • Target

    283c08a771c7fb18463294ae3b75b07449c3c07a2b45f63ae9831d8709b10512

  • Size

    2.3MB

  • Sample

    221122-xvbp6sea24

  • MD5

    51b63624539d377d79a619208b2cc795

  • SHA1

    15da4757cf87574eee4fb4538bed3639f83f9ddb

  • SHA256

    283c08a771c7fb18463294ae3b75b07449c3c07a2b45f63ae9831d8709b10512

  • SHA512

    83115bb2a56e85b59cce5c8bd346667efe8416f959e751c959b1802a48e3c53f8e4c5f057b2f86a9a9563f5e6f85429fd82651b1dc66c433565b99cc25c43a4e

  • SSDEEP

    49152:WlmMc8EjGCbKeaoK94jmPBLeL7gBfi/4gXkc/hbHorCUm0fN:Wlm382GCbKeWyjUBLL2dT/xoWUT

Malware Config

Targets

    • Target

      283c08a771c7fb18463294ae3b75b07449c3c07a2b45f63ae9831d8709b10512

    • Size

      2.3MB

    • MD5

      51b63624539d377d79a619208b2cc795

    • SHA1

      15da4757cf87574eee4fb4538bed3639f83f9ddb

    • SHA256

      283c08a771c7fb18463294ae3b75b07449c3c07a2b45f63ae9831d8709b10512

    • SHA512

      83115bb2a56e85b59cce5c8bd346667efe8416f959e751c959b1802a48e3c53f8e4c5f057b2f86a9a9563f5e6f85429fd82651b1dc66c433565b99cc25c43a4e

    • SSDEEP

      49152:WlmMc8EjGCbKeaoK94jmPBLeL7gBfi/4gXkc/hbHorCUm0fN:Wlm382GCbKeWyjUBLL2dT/xoWUT

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks