General

  • Target

    b1ebae4eaf805b2303fde0f4da963254c4649aeb0f7de7b0580a3eff1512d2b6

  • Size

    89KB

  • Sample

    220130-x3wejshbgj

  • MD5

    4d8482da8730a886e4d21c5bfb7cd30e

  • SHA1

    517e06b992e14529f712e7f48dd447422535b3a4

  • SHA256

    b1ebae4eaf805b2303fde0f4da963254c4649aeb0f7de7b0580a3eff1512d2b6

  • SHA512

    45870da5a5ef52038a0ffbb59dd7da558222d0d1f1fd20c9a8a3248e75a1f79d25ad8e35e6e73a933b4f5b0328faca23f8bac908e89f96381769205714383670

Malware Config

Targets

    • Target

      b1ebae4eaf805b2303fde0f4da963254c4649aeb0f7de7b0580a3eff1512d2b6

    • Size

      89KB

    • MD5

      4d8482da8730a886e4d21c5bfb7cd30e

    • SHA1

      517e06b992e14529f712e7f48dd447422535b3a4

    • SHA256

      b1ebae4eaf805b2303fde0f4da963254c4649aeb0f7de7b0580a3eff1512d2b6

    • SHA512

      45870da5a5ef52038a0ffbb59dd7da558222d0d1f1fd20c9a8a3248e75a1f79d25ad8e35e6e73a933b4f5b0328faca23f8bac908e89f96381769205714383670

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks