General

  • Target

    b572ab61e1dff278bb02d448a0d71c6b4e1802e206d3a6edd0fab6ad86e83eb0

  • Size

    2.3MB

  • Sample

    221205-hw2knafe96

  • MD5

    1c325867a3bc061416ecbd299cfe3bea

  • SHA1

    ddbaf9c99638552618f07766fb2874c6cb9c689d

  • SHA256

    b572ab61e1dff278bb02d448a0d71c6b4e1802e206d3a6edd0fab6ad86e83eb0

  • SHA512

    80e5621f29f4bf9642a8fa4b10310eb62f52d27fcbce2d79886a1448e04082d42d5a3e2dfc333149c73bbd60024e24f530f5e90855f8f662276c06ad2597bdb6

  • SSDEEP

    49152:QAJYZmA562y6sq82PQyN8XEPkNVGsbYGDEPwRk33O8RQRhBrTG0yXeF1F/8gfaoE:7JYYA562yn4OVeMswRkfqFTG0UI/xfaF

Score
10/10

Malware Config

Targets

    • Target

      b572ab61e1dff278bb02d448a0d71c6b4e1802e206d3a6edd0fab6ad86e83eb0

    • Size

      2.3MB

    • MD5

      1c325867a3bc061416ecbd299cfe3bea

    • SHA1

      ddbaf9c99638552618f07766fb2874c6cb9c689d

    • SHA256

      b572ab61e1dff278bb02d448a0d71c6b4e1802e206d3a6edd0fab6ad86e83eb0

    • SHA512

      80e5621f29f4bf9642a8fa4b10310eb62f52d27fcbce2d79886a1448e04082d42d5a3e2dfc333149c73bbd60024e24f530f5e90855f8f662276c06ad2597bdb6

    • SSDEEP

      49152:QAJYZmA562y6sq82PQyN8XEPkNVGsbYGDEPwRk33O8RQRhBrTG0yXeF1F/8gfaoE:7JYYA562yn4OVeMswRkfqFTG0UI/xfaF

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks