General

  • Target

    cb3a4e1b980e21596c8d39c4f8babc1a225f57e918f1acd750a3e1c713873aa8

  • Size

    3.3MB

  • Sample

    221127-fdk4vaaf46

  • MD5

    3034a42900fbface754e83567cb1e8b8

  • SHA1

    6538da3b999db0894615130fd300a4f2c225c108

  • SHA256

    cb3a4e1b980e21596c8d39c4f8babc1a225f57e918f1acd750a3e1c713873aa8

  • SHA512

    28bc6dd4d9893afe881b0dd456fb361aa3b151e2f3330432a96cf7ae77c429b6d2ff7a503f62ce71a6e0d247f42aa94b36fd1f8f125548226ed5355a8ca60330

  • SSDEEP

    98304:GsTpLAuoFngsWRfajfdJf+S8kvah7iy7cYiwOBpIeWH:GsTp8uoF7fdJmRkyh7iehi1zwH

Score
10/10

Malware Config

Targets

    • Target

      cb3a4e1b980e21596c8d39c4f8babc1a225f57e918f1acd750a3e1c713873aa8

    • Size

      3.3MB

    • MD5

      3034a42900fbface754e83567cb1e8b8

    • SHA1

      6538da3b999db0894615130fd300a4f2c225c108

    • SHA256

      cb3a4e1b980e21596c8d39c4f8babc1a225f57e918f1acd750a3e1c713873aa8

    • SHA512

      28bc6dd4d9893afe881b0dd456fb361aa3b151e2f3330432a96cf7ae77c429b6d2ff7a503f62ce71a6e0d247f42aa94b36fd1f8f125548226ed5355a8ca60330

    • SSDEEP

      98304:GsTpLAuoFngsWRfajfdJf+S8kvah7iy7cYiwOBpIeWH:GsTp8uoF7fdJmRkyh7iehi1zwH

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

2
T1158

Modify Existing Service

1
T1031

Defense Evasion

Hidden Files and Directories

2
T1158

Impair Defenses

1
T1562

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Impact

Service Stop

1
T1489

Tasks