General

  • Target

    4918a76579bcd24304713ea5568f93a8a978a079c0d8d1d2bb1f9933046a0da8

  • Size

    89KB

  • Sample

    220130-y4wblsaahl

  • MD5

    41093a982526c6dc7dbcf4f63814d428

  • SHA1

    85fc68bbb79854bcd59fff566328a9856897d0d9

  • SHA256

    4918a76579bcd24304713ea5568f93a8a978a079c0d8d1d2bb1f9933046a0da8

  • SHA512

    3665a000cb7ee2264491788bb6b8177cb9d6b12a196a8a21278397e9f5cb5fb314f2c73bcb98489dc4ef1bbc23e4e8e62da345704bff73c8859c8d613afafa88

Malware Config

Targets

    • Target

      4918a76579bcd24304713ea5568f93a8a978a079c0d8d1d2bb1f9933046a0da8

    • Size

      89KB

    • MD5

      41093a982526c6dc7dbcf4f63814d428

    • SHA1

      85fc68bbb79854bcd59fff566328a9856897d0d9

    • SHA256

      4918a76579bcd24304713ea5568f93a8a978a079c0d8d1d2bb1f9933046a0da8

    • SHA512

      3665a000cb7ee2264491788bb6b8177cb9d6b12a196a8a21278397e9f5cb5fb314f2c73bcb98489dc4ef1bbc23e4e8e62da345704bff73c8859c8d613afafa88

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks