General

  • Target

    c24136e437626a4bbff24961348b7357d41566ff9e1c0eb0f17ab768fdc09c27

  • Size

    89KB

  • Sample

    220122-bnhdgsgghl

  • MD5

    a1a15a9e82880e8fc881668c70126315

  • SHA1

    c14565c7845a709e7c19b0176b656a19d21e2229

  • SHA256

    c24136e437626a4bbff24961348b7357d41566ff9e1c0eb0f17ab768fdc09c27

  • SHA512

    da26b6ff0de17623eb8bd3de752ac2786907a700a24c0022e82185257b56824504520a5bca2e6b9e6d0efce8404f9dcf9e2d9884923fa3625a39ebf366cbb840

Malware Config

Targets

    • Target

      c24136e437626a4bbff24961348b7357d41566ff9e1c0eb0f17ab768fdc09c27

    • Size

      89KB

    • MD5

      a1a15a9e82880e8fc881668c70126315

    • SHA1

      c14565c7845a709e7c19b0176b656a19d21e2229

    • SHA256

      c24136e437626a4bbff24961348b7357d41566ff9e1c0eb0f17ab768fdc09c27

    • SHA512

      da26b6ff0de17623eb8bd3de752ac2786907a700a24c0022e82185257b56824504520a5bca2e6b9e6d0efce8404f9dcf9e2d9884923fa3625a39ebf366cbb840

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks