General

  • Target

    bc22523add8140bf785a7a0bb446e95275dcedea3de642f23000e5c705044385

  • Size

    89KB

  • Sample

    220121-3ykedaebel

  • MD5

    faed2bcd842e81c180a6ac9dde78f8d5

  • SHA1

    dca21e88ad4e7ae8b0a7214cb53863ac2dfee60c

  • SHA256

    bc22523add8140bf785a7a0bb446e95275dcedea3de642f23000e5c705044385

  • SHA512

    1ae6581bde17c7b7836d95713eb38c9e3120345b02d339eaf78d7f4089fb917326ae0d4372ec84ca5855ea4e9cce63f39962ee6712664826afa73a4c0b0656f2

Malware Config

Targets

    • Target

      bc22523add8140bf785a7a0bb446e95275dcedea3de642f23000e5c705044385

    • Size

      89KB

    • MD5

      faed2bcd842e81c180a6ac9dde78f8d5

    • SHA1

      dca21e88ad4e7ae8b0a7214cb53863ac2dfee60c

    • SHA256

      bc22523add8140bf785a7a0bb446e95275dcedea3de642f23000e5c705044385

    • SHA512

      1ae6581bde17c7b7836d95713eb38c9e3120345b02d339eaf78d7f4089fb917326ae0d4372ec84ca5855ea4e9cce63f39962ee6712664826afa73a4c0b0656f2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks