RTM

RTM is a cybercriminal group that has been active since at least 2015 and is primarily interested in users of remote banking systems in Russia and neighboring countries. The group uses a Trojan by the same name (RTM). [1]

ID: G0048
Contributors: Oleg Skulkin, Group-IB
Version: 1.1
Created: 31 May 2017
Last Modified: 12 May 2020

Techniques Used

Domain ID Name Use
Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

RTM has used Registry run keys to establish persistence for the RTM Trojan and other tools, such as a modified version of TeamViewer remote desktop software.[1][2]

Enterprise T1189 Drive-by Compromise

RTM has distributed its malware via the RIG and SUNDOWN exploit kits, as well as online advertising network Yandex.Direct.[1][3]

Enterprise T1574 .001 Hijack Execution Flow: DLL Search Order Hijacking

RTM has used search order hijacking to force TeamViewer to load a malicious DLL.[2]

Enterprise T1566 .001 Phishing: Spearphishing Attachment

RTM has used spearphishing attachments to distribute its malware.[2]

Enterprise T1219 Remote Access Software

RTM has used a modified version of TeamViewer and Remote Utilities for remote access.[2]

Enterprise T1204 .002 User Execution: Malicious File

RTM has attempted to lure victims into opening e-mail attachments to execute malicious code.[2]

Enterprise T1102 .001 Web Service: Dead Drop Resolver

RTM has used an RSS feed on Livejournal to update a list of encrypted C2 server names.[1]

Software

References