General

  • Target

    091516a7bc6ff5114ec212a8a33519886f4b3b6889125119bacd5f4bbf7f8362

  • Size

    89KB

  • Sample

    220121-3wmrqaeaeq

  • MD5

    fedf54586ebd00684e20712ad7eb9189

  • SHA1

    da33226bd6f3bb61c7e2b37a731b70ab99367ae2

  • SHA256

    091516a7bc6ff5114ec212a8a33519886f4b3b6889125119bacd5f4bbf7f8362

  • SHA512

    82ec682ad173eedc9ee51a0238eb4c1175e6d4da74c58261834d0ab38e8b1bc96c82872df27beb9aa69f3a9fb312c941f241a2fe975a9fcd8a41ae65ece81a6b

Malware Config

Targets

    • Target

      091516a7bc6ff5114ec212a8a33519886f4b3b6889125119bacd5f4bbf7f8362

    • Size

      89KB

    • MD5

      fedf54586ebd00684e20712ad7eb9189

    • SHA1

      da33226bd6f3bb61c7e2b37a731b70ab99367ae2

    • SHA256

      091516a7bc6ff5114ec212a8a33519886f4b3b6889125119bacd5f4bbf7f8362

    • SHA512

      82ec682ad173eedc9ee51a0238eb4c1175e6d4da74c58261834d0ab38e8b1bc96c82872df27beb9aa69f3a9fb312c941f241a2fe975a9fcd8a41ae65ece81a6b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks