General

  • Target

    data0.bin

  • Size

    107.5MB

  • Sample

    240811-3d56caycph

  • MD5

    582a7ccf130d82fd670e8f5bb03b115f

  • SHA1

    a4bc2cb2296aa981cc4c10940e691cf7490d9759

  • SHA256

    a653745c5da2c86b3ad137d82c20eb3f23a07e229362c068f0b01071cb448d53

  • SHA512

    b01a22d3cfb0348c55babb4ae4a998f90da4920ac0ecc8ce57549fa20e550ac4740eccdba96ef379c754a0ae77e591be4a420ca5e732d0d98d1de59bee68c889

  • SSDEEP

    3145728:4tfe2BYoE8uO/6t9yNNOnEok4GpEYr1TShId6/n:iWKk9yNNOE9luk1dda

Malware Config

Targets

    • Target

      data0.bin

    • Size

      107.5MB

    • MD5

      582a7ccf130d82fd670e8f5bb03b115f

    • SHA1

      a4bc2cb2296aa981cc4c10940e691cf7490d9759

    • SHA256

      a653745c5da2c86b3ad137d82c20eb3f23a07e229362c068f0b01071cb448d53

    • SHA512

      b01a22d3cfb0348c55babb4ae4a998f90da4920ac0ecc8ce57549fa20e550ac4740eccdba96ef379c754a0ae77e591be4a420ca5e732d0d98d1de59bee68c889

    • SSDEEP

      3145728:4tfe2BYoE8uO/6t9yNNOnEok4GpEYr1TShId6/n:iWKk9yNNOE9luk1dda

    • Modifies Windows Defender Real-time Protection settings

    • Modifies Windows Defender notification settings

    • Modifies visiblity of hidden/system files in Explorer

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Remote Service Session Hijacking: RDP Hijacking

      Adversaries may hijack a legitimate user's remote desktop session to move laterally within an environment.

    • Blocks application from running via registry modification

      Adds application to list of disallowed applications.

    • Drops file in Drivers directory

    • Modifies Windows Firewall

    • Server Software Component: Terminal Services DLL

    • Stops running service(s)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Modifies WinLogon

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Hide Artifacts: Hidden Users

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks