General

  • Target

    f022fd6c5c647b58cc4e31d6e19b210eeb689d84b6c5a1eacfede18952b7f264

  • Size

    89KB

  • Sample

    220130-qk6n8sbfbj

  • MD5

    8b3de46ecb113cd1ee2d9ec46527358f

  • SHA1

    7727b339e73930ab8ffa90e19f6cf7a9d8981e41

  • SHA256

    f022fd6c5c647b58cc4e31d6e19b210eeb689d84b6c5a1eacfede18952b7f264

  • SHA512

    8e072960e7f7f4c0340cb0140219c6a2ff73c39f6fc0a75929724e494d43b17d8d4c7dc4900b55fc4ebf2b4b9551392f8a7a28ce117970a73f31cd0af09eacf5

Malware Config

Targets

    • Target

      f022fd6c5c647b58cc4e31d6e19b210eeb689d84b6c5a1eacfede18952b7f264

    • Size

      89KB

    • MD5

      8b3de46ecb113cd1ee2d9ec46527358f

    • SHA1

      7727b339e73930ab8ffa90e19f6cf7a9d8981e41

    • SHA256

      f022fd6c5c647b58cc4e31d6e19b210eeb689d84b6c5a1eacfede18952b7f264

    • SHA512

      8e072960e7f7f4c0340cb0140219c6a2ff73c39f6fc0a75929724e494d43b17d8d4c7dc4900b55fc4ebf2b4b9551392f8a7a28ce117970a73f31cd0af09eacf5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks