General

  • Target

    4dfe7e9ea948cb5da64b29afff2b56b416552c4c36bd5a04ee39939ae51b961e

  • Size

    89KB

  • Sample

    220130-afje5sbghq

  • MD5

    01c45a203526978a7d8d0457594fafbf

  • SHA1

    5c8f735dd82262516adb6f393b56062b7f87b66b

  • SHA256

    4dfe7e9ea948cb5da64b29afff2b56b416552c4c36bd5a04ee39939ae51b961e

  • SHA512

    2e5732ec094383bddb4230ca88ce324c7d1fbeece0ec44bb97fe0de4990c9d2dac37a787cd07a45920892e4aa9927eed1403cef64f00432e7527e835c75b317e

Malware Config

Targets

    • Target

      4dfe7e9ea948cb5da64b29afff2b56b416552c4c36bd5a04ee39939ae51b961e

    • Size

      89KB

    • MD5

      01c45a203526978a7d8d0457594fafbf

    • SHA1

      5c8f735dd82262516adb6f393b56062b7f87b66b

    • SHA256

      4dfe7e9ea948cb5da64b29afff2b56b416552c4c36bd5a04ee39939ae51b961e

    • SHA512

      2e5732ec094383bddb4230ca88ce324c7d1fbeece0ec44bb97fe0de4990c9d2dac37a787cd07a45920892e4aa9927eed1403cef64f00432e7527e835c75b317e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks