| File name: | rutserv.exe |
| Full analysis: | https://app.any.run/tasks/8c02f844-73a5-46b4-9230-02f3b59cb5e5 |
| Verdict: | Malicious activity |
| Threats: | Metamorfo is a trojan malware family that has been active since 2018. It remains a top threat, focusing on stealing victims’ financial information, including banking credentials and other data. The malware is known for targeting users in Brazil. |
| Analysis date: | January 04, 2024, 08:35:58 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | C805F814BE968F1405A1144D02E8034D |
| SHA1: | 600B70C9565F138232A2F72A247381703EE2BA79 |
| SHA256: | B9B5BF758928B1E68A6D3E8001A71572076DDAD8B46765DFEC25C4947DAAC87D |
| SSDEEP: | 98304:llBiTwUaaNl8OGNZClhwzjBKLPxcCw5jklA+ke6IAV6YlHSzmVUJMW6G4tOlIlqK:CPu3 |
| .exe | | | Inno Setup installer (53.5) |
|---|---|---|
| .exe | | | InstallShield setup (21) |
| .exe | | | Win32 EXE PECompact compressed (generic) (20.2) |
| .exe | | | Win32 Executable (generic) (2.1) |
| .exe | | | Win16/32 Executable Delphi generic (1) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2017:04:13 12:13:16+02:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 7320576 |
| InitializedDataSize: | 2008576 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6fc7b8 |
| OSVersion: | 5 |
| ImageVersion: | - |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 6.6.0.3 |
| ProductVersionNumber: | 6.6.0.3 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | TektonIT |
| FileDescription: | RMS |
| FileVersion: | 6.6.0.3 |
| LegalCopyright: | Copyright © 2017 TektonIT. All rights reserved. |
| LegalTrademarks: | Remote Manipulator System, TektonIT |
| ProductName: | Remote Manipulator System |
| ProductVersion: | 6.6.0.3 |
| ProgramID: | ru.rmansys.rutserv |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 784 | C:\Users\admin\AppData\Local\Temp\rutserv.exe -second | C:\Users\admin\AppData\Local\Temp\rutserv.exe | rutserv.exe | ||||||||||||
User: SYSTEM Company: TektonIT Integrity Level: SYSTEM Description: RMS Exit code: 0 Version: 6.6.0.3 Modules
| |||||||||||||||
| 1072 | "C:\Users\admin\AppData\Local\Temp\rutserv.exe" | C:\Users\admin\AppData\Local\Temp\rutserv.exe | — | explorer.exe | |||||||||||
User: admin Company: TektonIT Integrity Level: MEDIUM Description: RMS Exit code: 3221226540 Version: 6.6.0.3 Modules
| |||||||||||||||
| 2016 | "C:\Users\admin\AppData\Local\Temp\rutserv.exe" | C:\Users\admin\AppData\Local\Temp\rutserv.exe | explorer.exe | ||||||||||||
User: admin Company: TektonIT Integrity Level: HIGH Description: RMS Exit code: 0 Version: 6.6.0.3 Modules
| |||||||||||||||
| (PID) Process: | (784) rutserv.exe | Key: | HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\TektonIT\RMS Buhphone\Host\Parameters |
| Operation: | write | Name: | Options |
Value: 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 | |||
| (PID) Process: | (784) rutserv.exe | Key: | HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\TektonIT\RMS Buhphone\Host\Parameters |
| Operation: | write | Name: | InternetId |
Value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| |||
| (PID) Process: | (784) rutserv.exe | Key: | HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\TektonIT\RMS Buhphone\Host\Parameters |
| Operation: | write | Name: | Options |
Value: 545046301154524F4D5365727665724F7074696F6E7300095573654E5441757468080D53656375726974794C6576656C020304506F727403121614456E61626C654F7665726C617943617074757265080C53686F775472617949636F6E0915486964655472617949636F6E506F7075704D656E75080642696E644950060D416E7920696E746572666163651343616C6C6261636B4175746F436F6E6E656374091743616C6C6261636B436F6E6E656374496E74657276616C023C084869646553746F70080C497046696C746572547970650202105573654C656761637943617074757265081750726F7465637443616C6C6261636B53657474696E6773081550726F74656374496E6574496453657474696E6773080F446F4E6F7443617074757265524450080755736549507636091141736B557365725065726D697373696F6E0816557365725065726D697373696F6E496E74657276616C031027134175746F416C6C6F775065726D697373696F6E08134E656564417574686F72697479536572766572081F41736B5065726D697373696F6E4F6E6C794966557365724C6F676765644F6E0811557365496E6574436F6E6E656374696F6E0813557365437573746F6D496E6574536572766572080A496E65744964506F727402000D557365496E6574496449507636081444697361626C6552656D6F7465436F6E74726F6C081344697361626C6552656D6F746553637265656E081344697361626C6546696C655472616E73666572080F44697361626C655265646972656374080D44697361626C6554656C6E6574081444697361626C6552656D6F746545786563757465081244697361626C655461736B4D616E61676572080E44697361626C654F7665726C6179080F44697361626C6553687574646F776E081444697361626C6552656D6F746555706772616465081544697361626C655072657669657743617074757265081444697361626C654465766963654D616E61676572080B44697361626C6543686174081344697361626C6553637265656E5265636F7264081044697361626C65415643617074757265081244697361626C6553656E644D657373616765080F44697361626C655265676973747279080D44697361626C65415643686174081544697361626C6552656D6F746553657474696E6773081544697361626C6552656D6F74655072696E74696E67080A44697361626C65526470080F4E6F7469667953686F7750616E656C09144E6F746966794368616E67655472617949636F6E09104E6F7469667942616C6C6F6E48696E74080F4E6F74696679506C6179536F756E64080C4E6F7469667950616E656C5802FF0C4E6F7469667950616E656C5902FF064C6F6755736509055369644964061034353239352E333538343639313738321144697361626C65496E7465726E65744964080B536166654D6F6465536574080F53796E6341757468456E61626C6564081253686F7749644E6F74696669636174696F6E080000 | |||
| (PID) Process: | (784) rutserv.exe | Key: | HKEY_USERS\S-1-5-21-1302019708-1500728564-335382590-1000\Software\TektonIT\RMS Buhphone\Host\Parameters |
| Operation: | write | Name: | InternetId |
Value: EFBBBF3C3F786D6C2076657273696F6E3D22312E302220656E636F64696E673D225554462D38223F3E0D0A3C726D735F696E7465726E65745F69645F73657474696E67732076657273696F6E3D223636303033223E3C696E7465726E65745F69643E3336392D3333352D3631372D3230313C2F696E7465726E65745F69643E3C7573655F696E65745F636F6E6E656374696F6E3E747275653C2F7573655F696E65745F636F6E6E656374696F6E3E3C696E65745F7365727665723E3C2F696E65745F7365727665723E3C7573655F637573746F6D5F696E65745F7365727665723E66616C73653C2F7573655F637573746F6D5F696E65745F7365727665723E3C696E65745F69645F706F72743E353635353C2F696E65745F69645F706F72743E3C7573655F696E65745F69645F697076363E66616C73653C2F7573655F696E65745F69645F697076363E3C2F726D735F696E7465726E65745F69645F73657474696E67733E0D0A | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 784 | rutserv.exe | C:\Users\admin\AppData\Roaming\RMS_settings\Logs\rms_log_2024-01.html | html | |
MD5:1F60472C9CD328E314A1155841DBAD2E | SHA256:3390EBE772EAE87BB157E7D5D4753DBE0EC24CCAF57760C54435722A15B88905 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1080 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
784 | rutserv.exe | 95.213.205.83:5655 | rms-server.tektonit.ru | OOO Network of data-centers Selectel | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
rms-server.tektonit.ru |
| unknown |
Process | Message |
|---|---|
rutserv.exe | 04-01-2024_08:36:11:737#T:Error #19 @2 |
rutserv.exe | MSG_KEEP_ALIVE |
rutserv.exe | 04-01-2024_08:36:51:940#T:Msg Size: 104 |
rutserv.exe | 04-01-2024_08:36:51:940#T:Msg code: 3 |
rutserv.exe | 04-01-2024_08:36:51:940#T:MSG_KEEP_ALIVE |