General

  • Target

    2bcff388ad12a48cdb14fff8793b8581d357dcf5a6d44d6bd735fda2274a056b

  • Size

    89KB

  • Sample

    220122-bl4hyaggbq

  • MD5

    a39729153ceaeaf9b3aded9a28d0e4dc

  • SHA1

    4a893e20379d454c94b637caf15a9eb8a20491fa

  • SHA256

    2bcff388ad12a48cdb14fff8793b8581d357dcf5a6d44d6bd735fda2274a056b

  • SHA512

    4bf506c6552202d59dbc0ddfafbaa6386dcdf0feac1020b4c4ffed0fc386570e100b1f2f30fbeba59f7ce144f56e20b99a90c60ba2eec758cf072e8755535ca8

Malware Config

Targets

    • Target

      2bcff388ad12a48cdb14fff8793b8581d357dcf5a6d44d6bd735fda2274a056b

    • Size

      89KB

    • MD5

      a39729153ceaeaf9b3aded9a28d0e4dc

    • SHA1

      4a893e20379d454c94b637caf15a9eb8a20491fa

    • SHA256

      2bcff388ad12a48cdb14fff8793b8581d357dcf5a6d44d6bd735fda2274a056b

    • SHA512

      4bf506c6552202d59dbc0ddfafbaa6386dcdf0feac1020b4c4ffed0fc386570e100b1f2f30fbeba59f7ce144f56e20b99a90c60ba2eec758cf072e8755535ca8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks