General
-
Target
virussign.com_1bc0e4769e7c8d200892a2b1450961e0
-
Size
212KB
-
Sample
220716-j4f5csbcam
-
MD5
1bc0e4769e7c8d200892a2b1450961e0
-
SHA1
08b0805ed34458af16a73e494999ad2e8ba83655
-
SHA256
7a3c203d3668423e2bf6e11568ceeac3c5081d06f304db0db39fea341833323e
-
SHA512
406170bf43063a2b18359560d73ef0c3bb0726d3f0d180d3aa02e504ac0cda3eb408606f8932ed35e4e0a84f1d04cbe0fa6212d910a33089dc496d8dd644a502
Behavioral task
behavioral1
Sample
virussign.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
virussign.com_1bc0e4769e7c8d200892a2b1450961e0
-
Size
212KB
-
MD5
1bc0e4769e7c8d200892a2b1450961e0
-
SHA1
08b0805ed34458af16a73e494999ad2e8ba83655
-
SHA256
7a3c203d3668423e2bf6e11568ceeac3c5081d06f304db0db39fea341833323e
-
SHA512
406170bf43063a2b18359560d73ef0c3bb0726d3f0d180d3aa02e504ac0cda3eb408606f8932ed35e4e0a84f1d04cbe0fa6212d910a33089dc496d8dd644a502
-
Sakula payload
-
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Adds Run key to start application
-