General

  • Target

    BB4B88DA25E06B8DAF7CD814F772849F0E28A1C8EBA92.exe

  • Size

    17.0MB

  • Sample

    230205-x5hapsae74

  • MD5

    b4266e0e77db85dca5049f660e922be9

  • SHA1

    d95db7a2f08524be2a87f80b38acc22a40a47991

  • SHA256

    bb4b88da25e06b8daf7cd814f772849f0e28a1c8eba92b67477a31bce5636309

  • SHA512

    06fc26943be1cf8cb1ae9836a4c674f8fa88deec3753b27797163759c5e9b715685f2960d815b491a18694f066796f5bed9b1a7d63d53f0bbe89fd6b8dd8b8a6

  • SSDEEP

    196608:/Q58/K0g9ipevueRveKwLAbbxtPZSl/9VyaTceDqrn04FMh3cuwJiWOPzUkONG1d:4517v3RvjnbdV8l5DdkM9lUXFLMVb

Score
10/10

Malware Config

Targets

    • Target

      BB4B88DA25E06B8DAF7CD814F772849F0E28A1C8EBA92.exe

    • Size

      17.0MB

    • MD5

      b4266e0e77db85dca5049f660e922be9

    • SHA1

      d95db7a2f08524be2a87f80b38acc22a40a47991

    • SHA256

      bb4b88da25e06b8daf7cd814f772849f0e28a1c8eba92b67477a31bce5636309

    • SHA512

      06fc26943be1cf8cb1ae9836a4c674f8fa88deec3753b27797163759c5e9b715685f2960d815b491a18694f066796f5bed9b1a7d63d53f0bbe89fd6b8dd8b8a6

    • SSDEEP

      196608:/Q58/K0g9ipevueRveKwLAbbxtPZSl/9VyaTceDqrn04FMh3cuwJiWOPzUkONG1d:4517v3RvjnbdV8l5DdkM9lUXFLMVb

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks