General

  • Target

    bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348

  • Size

    150KB

  • Sample

    210922-qnepxsfddk

  • MD5

    9640c0c25e279327d12a52a5e596724d

  • SHA1

    81efd5b75ec8e7e4fc5a063a2ab26bb1e21f8b4c

  • SHA256

    bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348

  • SHA512

    eda7bc138ce9656e80e4aa27990c1275795a92dac4fd7c93f8cb594e31b066bf1751fa7640b75db0f71986cf35beb324822959d679cfd1b6d0102d6e79f94bf7

Malware Config

Targets

    • Target

      bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348

    • Size

      150KB

    • MD5

      9640c0c25e279327d12a52a5e596724d

    • SHA1

      81efd5b75ec8e7e4fc5a063a2ab26bb1e21f8b4c

    • SHA256

      bf3b720b594dffc9beaf98e51f00f7c05fdde0a4ef554eb54611d8497b185348

    • SHA512

      eda7bc138ce9656e80e4aa27990c1275795a92dac4fd7c93f8cb594e31b066bf1751fa7640b75db0f71986cf35beb324822959d679cfd1b6d0102d6e79f94bf7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Remote System Discovery

1
T1018

Tasks