General

  • Target

    a8fffe1256732a78425b3c4b81c00c78.exe

  • Size

    6.1MB

  • Sample

    230531-lnrl9sed8y

  • MD5

    a8fffe1256732a78425b3c4b81c00c78

  • SHA1

    d10eb0b29b6f0f0092cda88bb03ac91e42ecf25e

  • SHA256

    97ff84a22b9ae106c9c6d6893575360411773f084d600ae3ae21bec7b26a4c66

  • SHA512

    ca458076bd9629a7faf7cfc60dd99a13f036cff48f998061d10d2ab3f8943c3c6437e1cf99841c4ae164bf40d94fa9496831daf4930863d0a3e2a96fad9b484f

  • SSDEEP

    196608:TIlF6JaxBEvXUJyXEJDNfZJoExr77dZWoNMUyr:EcYxBYXY+sJokFZWdUy

Malware Config

Targets

    • Target

      a8fffe1256732a78425b3c4b81c00c78.exe

    • Size

      6.1MB

    • MD5

      a8fffe1256732a78425b3c4b81c00c78

    • SHA1

      d10eb0b29b6f0f0092cda88bb03ac91e42ecf25e

    • SHA256

      97ff84a22b9ae106c9c6d6893575360411773f084d600ae3ae21bec7b26a4c66

    • SHA512

      ca458076bd9629a7faf7cfc60dd99a13f036cff48f998061d10d2ab3f8943c3c6437e1cf99841c4ae164bf40d94fa9496831daf4930863d0a3e2a96fad9b484f

    • SSDEEP

      196608:TIlF6JaxBEvXUJyXEJDNfZJoExr77dZWoNMUyr:EcYxBYXY+sJokFZWdUy

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks