General

  • Target

    0dca2c41d2e4c869660673f2097a1e66cace2cd9f7dad1c3fc6f75bbce5c564c

  • Size

    89KB

  • Sample

    220130-xhvbragfhr

  • MD5

    55daa4271973bb71ad4548225675e389

  • SHA1

    3d564bb416742c3f02d2196af2acbe830ce3a2c3

  • SHA256

    0dca2c41d2e4c869660673f2097a1e66cace2cd9f7dad1c3fc6f75bbce5c564c

  • SHA512

    f2cf7586075565eaea866937d242406e0d134d4d491a760b01ca419233066dc5824116e86d8eb14a7de326f3ac91269663473ccd23f470bc1d6454cec600837c

Malware Config

Targets

    • Target

      0dca2c41d2e4c869660673f2097a1e66cace2cd9f7dad1c3fc6f75bbce5c564c

    • Size

      89KB

    • MD5

      55daa4271973bb71ad4548225675e389

    • SHA1

      3d564bb416742c3f02d2196af2acbe830ce3a2c3

    • SHA256

      0dca2c41d2e4c869660673f2097a1e66cace2cd9f7dad1c3fc6f75bbce5c564c

    • SHA512

      f2cf7586075565eaea866937d242406e0d134d4d491a760b01ca419233066dc5824116e86d8eb14a7de326f3ac91269663473ccd23f470bc1d6454cec600837c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks