General

  • Target

    83ade247633d89edd7c003a5e977da5e6dbdce41ab1de3a688d167ce51e2501b

  • Size

    3.5MB

  • Sample

    221201-mf4gjahg34

  • MD5

    8f67199f264b4b15551a67932f46e63e

  • SHA1

    3ec6a7e99997c2dae412db35e0ba0347cb307cac

  • SHA256

    83ade247633d89edd7c003a5e977da5e6dbdce41ab1de3a688d167ce51e2501b

  • SHA512

    4204b3aff9b6f229717fea16eafa9e6e0337212dc6ccf2496258e5b3fd7951eeb0a4f17d9fde9c31d5241bf62fef949c4ff9f9a99a1ec3c31dee09ac23147503

  • SSDEEP

    49152:QAJYJJkoiDGevfebtMDlHD3AHBMpmwpe36KUBDHpuLsH/zMLKx0CmsjJGXpZeoiu:7JYJAfvmZMFuMjgduDHcm4LHCMXpmiz

Score
10/10

Malware Config

Targets

    • Target

      83ade247633d89edd7c003a5e977da5e6dbdce41ab1de3a688d167ce51e2501b

    • Size

      3.5MB

    • MD5

      8f67199f264b4b15551a67932f46e63e

    • SHA1

      3ec6a7e99997c2dae412db35e0ba0347cb307cac

    • SHA256

      83ade247633d89edd7c003a5e977da5e6dbdce41ab1de3a688d167ce51e2501b

    • SHA512

      4204b3aff9b6f229717fea16eafa9e6e0337212dc6ccf2496258e5b3fd7951eeb0a4f17d9fde9c31d5241bf62fef949c4ff9f9a99a1ec3c31dee09ac23147503

    • SSDEEP

      49152:QAJYJJkoiDGevfebtMDlHD3AHBMpmwpe36KUBDHpuLsH/zMLKx0CmsjJGXpZeoiu:7JYJAfvmZMFuMjgduDHcm4LHCMXpmiz

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks