General

  • Target

    bb67752e257791dff26c0229dcb9a28a93ed2b12713b2f53902bff9ab1c17131

  • Size

    89KB

  • Sample

    220130-zev5zsacgl

  • MD5

    391c01bdbeb5975c85cee0099adb132c

  • SHA1

    1e3bb25b24dc69d5a88aceeecee0d8a9af39927e

  • SHA256

    bb67752e257791dff26c0229dcb9a28a93ed2b12713b2f53902bff9ab1c17131

  • SHA512

    67fbd30ab0263cfd45fab2fe9710de4ba2c2183f3d1afc8fa284621bd021cd890e7ac05cd3445522e19cc18dd508e8030404c492d67d6c092e3b496fde622b1c

Malware Config

Targets

    • Target

      bb67752e257791dff26c0229dcb9a28a93ed2b12713b2f53902bff9ab1c17131

    • Size

      89KB

    • MD5

      391c01bdbeb5975c85cee0099adb132c

    • SHA1

      1e3bb25b24dc69d5a88aceeecee0d8a9af39927e

    • SHA256

      bb67752e257791dff26c0229dcb9a28a93ed2b12713b2f53902bff9ab1c17131

    • SHA512

      67fbd30ab0263cfd45fab2fe9710de4ba2c2183f3d1afc8fa284621bd021cd890e7ac05cd3445522e19cc18dd508e8030404c492d67d6c092e3b496fde622b1c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks