General

  • Target

    8a2ce7a4cd85b723c6f05efb6b5dd4d642a7fc9fab1aef43c971146b6374f03c

  • Size

    89KB

  • Sample

    220122-acggdaeeaq

  • MD5

    ef94e4b0bd689972df09e19a3ed0653e

  • SHA1

    fd37b9682d15c89f79a73c35eeda2cd381aad446

  • SHA256

    8a2ce7a4cd85b723c6f05efb6b5dd4d642a7fc9fab1aef43c971146b6374f03c

  • SHA512

    f11be4c6a36e20b1d4a8df8a44dfbb3f93cba5d7588e54f8b4cb0245dd130bb95ead53c8d05d98d6df32de3d2922896e1e58968bc7177f88718f0987c2172f47

Malware Config

Targets

    • Target

      8a2ce7a4cd85b723c6f05efb6b5dd4d642a7fc9fab1aef43c971146b6374f03c

    • Size

      89KB

    • MD5

      ef94e4b0bd689972df09e19a3ed0653e

    • SHA1

      fd37b9682d15c89f79a73c35eeda2cd381aad446

    • SHA256

      8a2ce7a4cd85b723c6f05efb6b5dd4d642a7fc9fab1aef43c971146b6374f03c

    • SHA512

      f11be4c6a36e20b1d4a8df8a44dfbb3f93cba5d7588e54f8b4cb0245dd130bb95ead53c8d05d98d6df32de3d2922896e1e58968bc7177f88718f0987c2172f47

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks