General

  • Target

    b9c65893800d1c04fb13078fd3fc2bd0e7cd1fb0eac9b6bfbc9bba15ff9f32f7

  • Size

    6.4MB

  • Sample

    221127-kwsc4ahe6x

  • MD5

    eaa15cfa6df1f8ff32d5fa6024922d6f

  • SHA1

    d8f2fc4ec0bcd3f3a4b7ea644b5214fa8dd7f42e

  • SHA256

    b9c65893800d1c04fb13078fd3fc2bd0e7cd1fb0eac9b6bfbc9bba15ff9f32f7

  • SHA512

    86a3c617eded125e2f437245e585452374077916d3d2b552a033331e0fc16e99ac59ee370fb4c15d37e948119a2573a98a1fa184909794cc47d525aad03c0ba7

  • SSDEEP

    196608:NM7/ZBDE9DfH2yVpFofWqPmWInEZyxoTL2s6kL:NmW9DuyVpFoPZyxoHIa

Score
10/10

Malware Config

Targets

    • Target

      b9c65893800d1c04fb13078fd3fc2bd0e7cd1fb0eac9b6bfbc9bba15ff9f32f7

    • Size

      6.4MB

    • MD5

      eaa15cfa6df1f8ff32d5fa6024922d6f

    • SHA1

      d8f2fc4ec0bcd3f3a4b7ea644b5214fa8dd7f42e

    • SHA256

      b9c65893800d1c04fb13078fd3fc2bd0e7cd1fb0eac9b6bfbc9bba15ff9f32f7

    • SHA512

      86a3c617eded125e2f437245e585452374077916d3d2b552a033331e0fc16e99ac59ee370fb4c15d37e948119a2573a98a1fa184909794cc47d525aad03c0ba7

    • SSDEEP

      196608:NM7/ZBDE9DfH2yVpFofWqPmWInEZyxoTL2s6kL:NmW9DuyVpFoPZyxoHIa

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Defense Evasion

Hidden Files and Directories

1
T1158

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks