General

  • Target

    99452760ef7c1d5bfd94c8db2cbd2fe2202cb13fe8e764bfd58a52933a9ea876

  • Size

    19KB

  • Sample

    220510-3sy1ksdcfr

  • MD5

    3746191d38bf729e9db2e1ac9f1aca80

  • SHA1

    0b372ebf284da5929c2fdffdff0b3c3406ad541b

  • SHA256

    99452760ef7c1d5bfd94c8db2cbd2fe2202cb13fe8e764bfd58a52933a9ea876

  • SHA512

    d55b7972eabf651be0ef0be68bc589739331e9833959e9ad18e96304582be8e3616d89b88abf81eba7b35593fc321db2a08bedb4d4c1888d869c56a85b80cafa

Malware Config

Targets

    • Target

      99452760ef7c1d5bfd94c8db2cbd2fe2202cb13fe8e764bfd58a52933a9ea876

    • Size

      19KB

    • MD5

      3746191d38bf729e9db2e1ac9f1aca80

    • SHA1

      0b372ebf284da5929c2fdffdff0b3c3406ad541b

    • SHA256

      99452760ef7c1d5bfd94c8db2cbd2fe2202cb13fe8e764bfd58a52933a9ea876

    • SHA512

      d55b7972eabf651be0ef0be68bc589739331e9833959e9ad18e96304582be8e3616d89b88abf81eba7b35593fc321db2a08bedb4d4c1888d869c56a85b80cafa

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • suricata: ET MALWARE Possible DEEP PANDA C2 Activity

      suricata: ET MALWARE Possible DEEP PANDA C2 Activity

    • suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5

      suricata: ET MALWARE Possible Deep Panda - Sakula/Mivast RAT CnC Beacon 5

    • suricata: ET MALWARE Sakula/Mivast C2 Activity

      suricata: ET MALWARE Sakula/Mivast C2 Activity

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Tasks