General

  • Target

    909ab00f91ab72f4637de733e534bfefacdaef4d66217353726148f73cd13a20

  • Size

    3.3MB

  • Sample

    221205-hw3gysfe99

  • MD5

    524ee4b4df67328653740a764f86a94e

  • SHA1

    cdd5153de9b9090b1e5c271a0d0fdb8374746162

  • SHA256

    909ab00f91ab72f4637de733e534bfefacdaef4d66217353726148f73cd13a20

  • SHA512

    72bdb65abb69e1de05fe7be012f28d4fdb4e3842329c497216624908e3e7e1b50d7aa6f4540e991b6fc59a594931d2315192d0e0dafcd666a68caa020a00579f

  • SSDEEP

    98304:7JYC4BP0AwP4unYP+0O8NPKDUDpQCOfCJ+N4dP5CVSu2:7JYBP0Oo8DDpS6Y4c32

Malware Config

Targets

    • Target

      909ab00f91ab72f4637de733e534bfefacdaef4d66217353726148f73cd13a20

    • Size

      3.3MB

    • MD5

      524ee4b4df67328653740a764f86a94e

    • SHA1

      cdd5153de9b9090b1e5c271a0d0fdb8374746162

    • SHA256

      909ab00f91ab72f4637de733e534bfefacdaef4d66217353726148f73cd13a20

    • SHA512

      72bdb65abb69e1de05fe7be012f28d4fdb4e3842329c497216624908e3e7e1b50d7aa6f4540e991b6fc59a594931d2315192d0e0dafcd666a68caa020a00579f

    • SSDEEP

      98304:7JYC4BP0AwP4unYP+0O8NPKDUDpQCOfCJ+N4dP5CVSu2:7JYBP0Oo8DDpS6Y4c32

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Executes dropped EXE

    • Modifies Windows Firewall

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook accounts

    • Accesses Microsoft Outlook profiles

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Hidden Files and Directories

2
T1158

Defense Evasion

Hidden Files and Directories

2
T1158

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Email Collection

2
T1114

Tasks