bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348
bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe
150KB
22-09-2021 13:29
9640c0c25e279327d12a52a5e596724d
81efd5b75ec8e7e4fc5a063a2ab26bb1e21f8b4c
bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348
Filter: none
-
Sakula
Description
Sakula is a remote access trojan with various capabilities.
Tags
-
Sakula Payload
Reported IOCs
resource yara_rule behavioral2/files/0x000100000001ab42-115.dat family_sakula behavioral2/files/0x000100000001ab42-116.dat family_sakula -
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
Description
suricata: ET MALWARE SUSPICIOUS UA (iexplore)
Tags
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
Description
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
Tags
-
Executes dropped EXEMediaCenter.exe
Reported IOCs
pid process 672 MediaCenter.exe -
Adds Run key to start applicationbf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicroMedia = "C:\\Users\\Admin\\AppData\\Local\\Temp\\MicroMedia\\MediaCenter.exe" bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe -
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Runs ping.exePING.EXE
TTPs
Reported IOCs
pid process 1376 PING.EXE -
Suspicious use of AdjustPrivilegeTokenbf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe
Reported IOCs
description pid process Token: SeIncBasePriorityPrivilege 604 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe -
Suspicious use of WriteProcessMemorybf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.execmd.exe
Reported IOCs
description pid process target process PID 604 wrote to memory of 672 604 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe MediaCenter.exe PID 604 wrote to memory of 672 604 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe MediaCenter.exe PID 604 wrote to memory of 672 604 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe MediaCenter.exe PID 604 wrote to memory of 1124 604 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe cmd.exe PID 604 wrote to memory of 1124 604 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe cmd.exe PID 604 wrote to memory of 1124 604 bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe cmd.exe PID 1124 wrote to memory of 1376 1124 cmd.exe PING.EXE PID 1124 wrote to memory of 1376 1124 cmd.exe PING.EXE PID 1124 wrote to memory of 1376 1124 cmd.exe PING.EXE
-
C:\Users\Admin\AppData\Local\Temp\bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe"C:\Users\Admin\AppData\Local\Temp\bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe"Adds Run key to start applicationSuspicious use of AdjustPrivilegeTokenSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeC:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exeExecutes dropped EXE
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 & del /q "C:\Users\Admin\AppData\Local\Temp\bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1Runs ping.exe
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
MD53950c1257b748c88d59da52eb30da835
SHA11452a51b66b2b5f6bd2a360859837cc363f12f28
SHA2565199fb482f75b7b988714ba09512566a51ea0fc1171d2976541e8c5c0499b5b6
SHA512b56ee018e502683b98c3eb9d5b4c079ee29e476047c9060b2615b69f6f48f04ad9ece8a5bde1610cdae5a1a3aa83e5f6db852b4950d40002489999b0fd003e02
-
C:\Users\Admin\AppData\Local\Temp\MicroMedia\MediaCenter.exe
MD53950c1257b748c88d59da52eb30da835
SHA11452a51b66b2b5f6bd2a360859837cc363f12f28
SHA2565199fb482f75b7b988714ba09512566a51ea0fc1171d2976541e8c5c0499b5b6
SHA512b56ee018e502683b98c3eb9d5b4c079ee29e476047c9060b2615b69f6f48f04ad9ece8a5bde1610cdae5a1a3aa83e5f6db852b4950d40002489999b0fd003e02
-
memory/672-114-0x0000000000000000-mapping.dmp
-
memory/1124-117-0x0000000000000000-mapping.dmp
-
memory/1376-118-0x0000000000000000-mapping.dmp