General

  • Target

    a087f8ae228817bdeeabb843bcd680dcf2c3c90f24405f35e0f7de358e9f9182

  • Size

    89KB

  • Sample

    220122-aabs4sechm

  • MD5

    f4862b793f89b9ca59da6ac38dff0e2d

  • SHA1

    f5cee3ad917b2d19e507387c912b577e2ba036db

  • SHA256

    a087f8ae228817bdeeabb843bcd680dcf2c3c90f24405f35e0f7de358e9f9182

  • SHA512

    f19a5e955748158d7627a94dd7373e25a1dd674c5453d480238b3c883367349ac6eda088c35806fa4c0adca8489b5467cb990b40d129279ddd5caf099cb78222

Malware Config

Targets

    • Target

      a087f8ae228817bdeeabb843bcd680dcf2c3c90f24405f35e0f7de358e9f9182

    • Size

      89KB

    • MD5

      f4862b793f89b9ca59da6ac38dff0e2d

    • SHA1

      f5cee3ad917b2d19e507387c912b577e2ba036db

    • SHA256

      a087f8ae228817bdeeabb843bcd680dcf2c3c90f24405f35e0f7de358e9f9182

    • SHA512

      f19a5e955748158d7627a94dd7373e25a1dd674c5453d480238b3c883367349ac6eda088c35806fa4c0adca8489b5467cb990b40d129279ddd5caf099cb78222

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks