General

  • Target

    1aac7739fb7413804e9d29d16497365d805ba00daf162461dcf043a970d23f4a

  • Size

    89KB

  • Sample

    220130-wl6zaafhbq

  • MD5

    63f171705b28a05c84b67750b7e0ebf7

  • SHA1

    5c0a8f5abe59267e890e7ddf475a10a5598cfce3

  • SHA256

    1aac7739fb7413804e9d29d16497365d805ba00daf162461dcf043a970d23f4a

  • SHA512

    0ed18d0e3a1649d2aaf58def947c0cb4640431846fa205784dec1c1c54ad4b8aedc45b1ca068ae8f772e8f13f4e8ffa225b905a21a538be2bb146fed8b27814c

Malware Config

Targets

    • Target

      1aac7739fb7413804e9d29d16497365d805ba00daf162461dcf043a970d23f4a

    • Size

      89KB

    • MD5

      63f171705b28a05c84b67750b7e0ebf7

    • SHA1

      5c0a8f5abe59267e890e7ddf475a10a5598cfce3

    • SHA256

      1aac7739fb7413804e9d29d16497365d805ba00daf162461dcf043a970d23f4a

    • SHA512

      0ed18d0e3a1649d2aaf58def947c0cb4640431846fa205784dec1c1c54ad4b8aedc45b1ca068ae8f772e8f13f4e8ffa225b905a21a538be2bb146fed8b27814c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks