General

  • Target

    45f5f8ce9bb7103e382d9c1158703b9b655d37a6ff31227132477e3600af9a8b

  • Size

    89KB

  • Sample

    220130-v8vn4afedl

  • MD5

    6a7b2feed82d8d1746ac78df5a429bce

  • SHA1

    da3cf059828c3b3304fe0713ae2460f22c966f40

  • SHA256

    45f5f8ce9bb7103e382d9c1158703b9b655d37a6ff31227132477e3600af9a8b

  • SHA512

    c6a9b673184f14f082abbf1ae0e723d8afac6f773ff5114f03ef2253caa29c4dfbb3b6f4513ee0418c281a0587eb470e9c683e421748524e6525e335574eb1b3

Malware Config

Targets

    • Target

      45f5f8ce9bb7103e382d9c1158703b9b655d37a6ff31227132477e3600af9a8b

    • Size

      89KB

    • MD5

      6a7b2feed82d8d1746ac78df5a429bce

    • SHA1

      da3cf059828c3b3304fe0713ae2460f22c966f40

    • SHA256

      45f5f8ce9bb7103e382d9c1158703b9b655d37a6ff31227132477e3600af9a8b

    • SHA512

      c6a9b673184f14f082abbf1ae0e723d8afac6f773ff5114f03ef2253caa29c4dfbb3b6f4513ee0418c281a0587eb470e9c683e421748524e6525e335574eb1b3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks