General

  • Target

    8a2a035a3dc4999e0227f7a9ade8cbda3b81f739766a1fa03dd8441698236801

  • Size

    89KB

  • Sample

    220130-qptkgabffm

  • MD5

    895dc0a3adfafce2a74d733ff2a8754e

  • SHA1

    073644294ef317aed16b435abb132afc09a3935d

  • SHA256

    8a2a035a3dc4999e0227f7a9ade8cbda3b81f739766a1fa03dd8441698236801

  • SHA512

    1189d33159ad7bb1cc5c0d3ab4afaa1650cfc84a0072e32df6a6fe68a4f45f915e1b501c08fc9b4b800b31de63edf076b23e08b34e357177a26779a9fe7d2622

Malware Config

Targets

    • Target

      8a2a035a3dc4999e0227f7a9ade8cbda3b81f739766a1fa03dd8441698236801

    • Size

      89KB

    • MD5

      895dc0a3adfafce2a74d733ff2a8754e

    • SHA1

      073644294ef317aed16b435abb132afc09a3935d

    • SHA256

      8a2a035a3dc4999e0227f7a9ade8cbda3b81f739766a1fa03dd8441698236801

    • SHA512

      1189d33159ad7bb1cc5c0d3ab4afaa1650cfc84a0072e32df6a6fe68a4f45f915e1b501c08fc9b4b800b31de63edf076b23e08b34e357177a26779a9fe7d2622

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks