General

  • Target

    b4266e0e77db85dca5049f660e922be9.bin

  • Size

    16.5MB

  • Sample

    230207-jjfcbsdd2v

  • MD5

    bb72ea83eee0da876cf7172a2e9589cb

  • SHA1

    1d72c6322fb167584f86719d1c9fb47995073ddd

  • SHA256

    f0108ae93c3ee3cf31cc34e08b27b1824e3a65d141ae50f12b5b41ee6e9fdb6b

  • SHA512

    086809b6ea7dd42412ffaada0e7bb2b3d4f0fd261d5fc06e40afd96c2833a0878a9abae2e3ed4a54744928fba791b328794dd4cf4e38907d1a104a897fc92e24

  • SSDEEP

    393216:ssGfG0iZljNd7aijIVHL2tzv4nv/j2pAz2BpKwiYlrN9fT:cdiZdNd794Lmv4/aprNZ

Score
10/10

Malware Config

Targets

    • Target

      bb4b88da25e06b8daf7cd814f772849f0e28a1c8eba92b67477a31bce5636309.exe

    • Size

      17.0MB

    • MD5

      b4266e0e77db85dca5049f660e922be9

    • SHA1

      d95db7a2f08524be2a87f80b38acc22a40a47991

    • SHA256

      bb4b88da25e06b8daf7cd814f772849f0e28a1c8eba92b67477a31bce5636309

    • SHA512

      06fc26943be1cf8cb1ae9836a4c674f8fa88deec3753b27797163759c5e9b715685f2960d815b491a18694f066796f5bed9b1a7d63d53f0bbe89fd6b8dd8b8a6

    • SSDEEP

      196608:/Q58/K0g9ipevueRveKwLAbbxtPZSl/9VyaTceDqrn04FMh3cuwJiWOPzUkONG1d:4517v3RvjnbdV8l5DdkM9lUXFLMVb

    Score
    10/10
    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks