General

  • Target

    5f73ad102fde39e9e44210276dd8898a1312bb924a8a843ebe3eda903fac9ed2

  • Size

    6.5MB

  • Sample

    221203-tj6jmaee33

  • MD5

    4e3d45aa75822c52750ec5055697c964

  • SHA1

    c325acfd8e8f04f2e14ac378843acc34dff54d26

  • SHA256

    5f73ad102fde39e9e44210276dd8898a1312bb924a8a843ebe3eda903fac9ed2

  • SHA512

    aa81f16a353dbe554031f76e6654938d2f81e611269b3c7298a34fca208125aadd65fa7acec3d588a89606d761a62f76f2bf37482a68fcbd4486653ed1a7e50f

  • SSDEEP

    98304:uP6ZK3zpZiKiky+rHKiMs9gpeMI2Znp7gDVuMDmORvUwTm7Jo12M4U0Zk:uiZozpZiMr/zCNALiOOwS7J62hna

Score
10/10

Malware Config

Targets

    • Target

      5f73ad102fde39e9e44210276dd8898a1312bb924a8a843ebe3eda903fac9ed2

    • Size

      6.5MB

    • MD5

      4e3d45aa75822c52750ec5055697c964

    • SHA1

      c325acfd8e8f04f2e14ac378843acc34dff54d26

    • SHA256

      5f73ad102fde39e9e44210276dd8898a1312bb924a8a843ebe3eda903fac9ed2

    • SHA512

      aa81f16a353dbe554031f76e6654938d2f81e611269b3c7298a34fca208125aadd65fa7acec3d588a89606d761a62f76f2bf37482a68fcbd4486653ed1a7e50f

    • SSDEEP

      98304:uP6ZK3zpZiKiky+rHKiMs9gpeMI2Znp7gDVuMDmORvUwTm7Jo12M4U0Zk:uiZozpZiMr/zCNALiOOwS7J62hna

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • UAC bypass

    • Executes dropped EXE

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks