General

  • Target

    rms.host6.3ru.msi

  • Size

    7.6MB

  • Sample

    231218-lgn8kabdb2

  • MD5

    4dc446d219e73f5218ad16b0f2c633d4

  • SHA1

    0a4e6de0272180db99a6ad04a74da2ba129ea873

  • SHA256

    fb48076d93e8705240d11e770cb928e79c4514cc4336e17bc845af33fedeb810

  • SHA512

    8768ba91e9ff5f0b8dbab1977876d1058824d2f07b58184fcab8a76c60db210b459bd32a04e038a6fec8946c5021eef214c90289ca1af94a27069365311cc9b4

  • SSDEEP

    196608:vw5w5SwnqgSGGmDW7dgf/668YsAtDyL4:4GwwnqLiDU+fS2

Malware Config

Targets

    • Target

      rms.host6.3ru.msi

    • Size

      7.6MB

    • MD5

      4dc446d219e73f5218ad16b0f2c633d4

    • SHA1

      0a4e6de0272180db99a6ad04a74da2ba129ea873

    • SHA256

      fb48076d93e8705240d11e770cb928e79c4514cc4336e17bc845af33fedeb810

    • SHA512

      8768ba91e9ff5f0b8dbab1977876d1058824d2f07b58184fcab8a76c60db210b459bd32a04e038a6fec8946c5021eef214c90289ca1af94a27069365311cc9b4

    • SSDEEP

      196608:vw5w5SwnqgSGGmDW7dgf/668YsAtDyL4:4GwwnqLiDU+fS2

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Registers new Print Monitor

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Blocklisted process makes network request

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks