General

  • Target

    fc8a589a472b3c37bf0ce3d266108e7f51dcaa2493e5f250f1af8c3e2c795c92

  • Size

    40KB

  • Sample

    220323-lkdw1agbek

  • MD5

    069c1f54a82c6d543fd4363f4277573f

  • SHA1

    3835aec3b01fe1b2e96c5f3db65ca1803a0e2831

  • SHA256

    fc8a589a472b3c37bf0ce3d266108e7f51dcaa2493e5f250f1af8c3e2c795c92

  • SHA512

    4444723a40ea49423aee7cc27e6dc00fc978952c2f0c3581b4a2be2902c6d6da33a8a41bc7a5ea281aa2a8c5da0614c80e074ef55f3ec78262e41336d0e190d8

Malware Config

Targets

    • Target

      fc8a589a472b3c37bf0ce3d266108e7f51dcaa2493e5f250f1af8c3e2c795c92

    • Size

      40KB

    • MD5

      069c1f54a82c6d543fd4363f4277573f

    • SHA1

      3835aec3b01fe1b2e96c5f3db65ca1803a0e2831

    • SHA256

      fc8a589a472b3c37bf0ce3d266108e7f51dcaa2493e5f250f1af8c3e2c795c92

    • SHA512

      4444723a40ea49423aee7cc27e6dc00fc978952c2f0c3581b4a2be2902c6d6da33a8a41bc7a5ea281aa2a8c5da0614c80e074ef55f3ec78262e41336d0e190d8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • suricata: ET MALWARE Possible DEEP PANDA C2 Activity

      suricata: ET MALWARE Possible DEEP PANDA C2 Activity

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 6

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 6

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 7

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 7

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks