General

  • Target

    69a71e8d87e3f9c694dfb532f99cfdf186d2c6d7ca109e6890b5f2272d2d6425

  • Size

    89KB

  • Sample

    220130-ac31dabgdm

  • MD5

    04e8510007eea6bb009ab3b053f039db

  • SHA1

    b9e93e1a71d901e67764c48a6dc4818b8ec63a50

  • SHA256

    69a71e8d87e3f9c694dfb532f99cfdf186d2c6d7ca109e6890b5f2272d2d6425

  • SHA512

    20fd643f3ce7dc9c29b9425d48fedf07702fe125c57112b7435f62c2366160af497ee5e13980f179f342e32f8dd94646457ce92275ad3f598da251fbdb8ca0b0

Malware Config

Targets

    • Target

      69a71e8d87e3f9c694dfb532f99cfdf186d2c6d7ca109e6890b5f2272d2d6425

    • Size

      89KB

    • MD5

      04e8510007eea6bb009ab3b053f039db

    • SHA1

      b9e93e1a71d901e67764c48a6dc4818b8ec63a50

    • SHA256

      69a71e8d87e3f9c694dfb532f99cfdf186d2c6d7ca109e6890b5f2272d2d6425

    • SHA512

      20fd643f3ce7dc9c29b9425d48fedf07702fe125c57112b7435f62c2366160af497ee5e13980f179f342e32f8dd94646457ce92275ad3f598da251fbdb8ca0b0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks