General

  • Target

    e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d

  • Size

    9.6MB

  • Sample

    250320-za3n9sx1ft

  • MD5

    6e9d2ef6a2146bb9ae5a5cf4d89759bb

  • SHA1

    3eff5752741da1c8f786d07021cad8f1237c23e8

  • SHA256

    e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d

  • SHA512

    713362bc1d2b25f4a8ed695f30bd2d340a43df336cbc598d43fafb3f1505c35585ca8ebaa5dadcfb4a0cbab75abc32a33d1ab17b2aee5d1272c60549d5309e18

  • SSDEEP

    196608:S3o9iCKRyyrUG5LO875QA++LsjNZuxzqCbcsf3KwUyHXpP9wcoAt7RXGR:ahfLxNa0L8Z2Pgsf3KwUy3JKcjtpGR

Malware Config

Targets

    • Target

      e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d

    • Size

      9.6MB

    • MD5

      6e9d2ef6a2146bb9ae5a5cf4d89759bb

    • SHA1

      3eff5752741da1c8f786d07021cad8f1237c23e8

    • SHA256

      e6fb0e2e891b20b476020c45c78560263ec22302035bb72b61934ec6cac64f6d

    • SHA512

      713362bc1d2b25f4a8ed695f30bd2d340a43df336cbc598d43fafb3f1505c35585ca8ebaa5dadcfb4a0cbab75abc32a33d1ab17b2aee5d1272c60549d5309e18

    • SSDEEP

      196608:S3o9iCKRyyrUG5LO875QA++LsjNZuxzqCbcsf3KwUyHXpP9wcoAt7RXGR:ahfLxNa0L8Z2Pgsf3KwUy3JKcjtpGR

    • RMS

      Remote Manipulator System (RMS) is a remote access tool developed by Russian organization TektonIT.

    • Rms family

    • Sets file to hidden

      Modifies file attributes to stop it showing in Explorer etc.

    • Stops running service(s)

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks