General

  • Target

    0e903c6e2b98f30f11da65003a8aeb63d3daef5feb92da5896250f08b9758c7e

  • Size

    7.9MB

  • Sample

    241212-w23xkavlbq

  • MD5

    ca298b43595a13e5bbb25535ead852f7

  • SHA1

    6fc8d0e3d36b245b2eb895f512e171381a96e268

  • SHA256

    0e903c6e2b98f30f11da65003a8aeb63d3daef5feb92da5896250f08b9758c7e

  • SHA512

    8c591cd0693b9516959c6d1c446f5619228021c1e7a95c208c736168cc90bc15dba47aca99aa6349f8e056a5c7f020c34b751d551260f9d3ba491b11cd953cf5

  • SSDEEP

    196608:aVLfwfMrKrMKK7jkXyyOvO9oLcmPffZxrhpL2TmJe:aVL4MOr/KHkXPOvO9oTZxhpL

Malware Config

Targets

    • Target

      0e903c6e2b98f30f11da65003a8aeb63d3daef5feb92da5896250f08b9758c7e

    • Size

      7.9MB

    • MD5

      ca298b43595a13e5bbb25535ead852f7

    • SHA1

      6fc8d0e3d36b245b2eb895f512e171381a96e268

    • SHA256

      0e903c6e2b98f30f11da65003a8aeb63d3daef5feb92da5896250f08b9758c7e

    • SHA512

      8c591cd0693b9516959c6d1c446f5619228021c1e7a95c208c736168cc90bc15dba47aca99aa6349f8e056a5c7f020c34b751d551260f9d3ba491b11cd953cf5

    • SSDEEP

      196608:aVLfwfMrKrMKK7jkXyyOvO9oLcmPffZxrhpL2TmJe:aVL4MOr/KHkXPOvO9oTZxhpL

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Rms family

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Indicator Removal: File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks