General

  • Target

    ee9ebfda5ff192c9c5dc2fb56edd99a330f285de177564301549e7d6acbe1704

  • Size

    4.3MB

  • Sample

    221129-wmj6xacc77

  • MD5

    a501bcef649cba7ecef71d689712febc

  • SHA1

    ec87dd696cf24aa9345b937c774018d8aac9eaac

  • SHA256

    ee9ebfda5ff192c9c5dc2fb56edd99a330f285de177564301549e7d6acbe1704

  • SHA512

    21cb4fbd1e2b1c6dde514c9aa76bd18f0040f8c932c8c57ba91c8e3e13c0124b8f59853d3c13ddbad33e963e0d0674a2b9c98b5f48242421430be6d84e8b17fc

  • SSDEEP

    98304:7JYuakukyg+fCpLG9fevK46z4hF42Xp+wsTWgIZY3TIvcQ4Ikxf6:7JTaHDnfCBsfewzcF42Xp+wZgIm3kcQD

Malware Config

Targets

    • Target

      ee9ebfda5ff192c9c5dc2fb56edd99a330f285de177564301549e7d6acbe1704

    • Size

      4.3MB

    • MD5

      a501bcef649cba7ecef71d689712febc

    • SHA1

      ec87dd696cf24aa9345b937c774018d8aac9eaac

    • SHA256

      ee9ebfda5ff192c9c5dc2fb56edd99a330f285de177564301549e7d6acbe1704

    • SHA512

      21cb4fbd1e2b1c6dde514c9aa76bd18f0040f8c932c8c57ba91c8e3e13c0124b8f59853d3c13ddbad33e963e0d0674a2b9c98b5f48242421430be6d84e8b17fc

    • SSDEEP

      98304:7JYuakukyg+fCpLG9fevK46z4hF42Xp+wsTWgIZY3TIvcQ4Ikxf6:7JTaHDnfCBsfewzcF42Xp+wZgIm3kcQD

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks