General

  • Target

    smss.exe

  • Size

    6.2MB

  • Sample

    231118-qgz3aafc2x

  • MD5

    d5187ea3ea26e8aabcde330cb97afc6d

  • SHA1

    cb2fa53482b6c720f3966e1d4e2366ce9cbb4084

  • SHA256

    3c14c6c148eb1fdb4f54c8f3c9a3eaed6143c8b53d4ab26add6c607117a036e0

  • SHA512

    4c87e20e8c13bd390bbb01188a9e1bccad700216cfa3af27e99f5800933ab753750ed9edf07358d39e8964d928275fcd1a387e0f224db2832b93d8198ff72589

  • SSDEEP

    196608:fICnc6JaxBEvXUJyXEJDNfZJoExr77dZWoNMUyr:TnxYxBYXY+sJokFZWdUy

Malware Config

Targets

    • Target

      smss.exe

    • Size

      6.2MB

    • MD5

      d5187ea3ea26e8aabcde330cb97afc6d

    • SHA1

      cb2fa53482b6c720f3966e1d4e2366ce9cbb4084

    • SHA256

      3c14c6c148eb1fdb4f54c8f3c9a3eaed6143c8b53d4ab26add6c607117a036e0

    • SHA512

      4c87e20e8c13bd390bbb01188a9e1bccad700216cfa3af27e99f5800933ab753750ed9edf07358d39e8964d928275fcd1a387e0f224db2832b93d8198ff72589

    • SSDEEP

      196608:fICnc6JaxBEvXUJyXEJDNfZJoExr77dZWoNMUyr:TnxYxBYXY+sJokFZWdUy

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Modifies Windows Firewall

    • Sets DLL path for service in the registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Modifies WinLogon

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks