General

  • Target

    72af72976c78e6002122e416832729f59c0ba9dbc45956bce08ee1dd4ee81ce2

  • Size

    89KB

  • Sample

    220131-ava3bacfep

  • MD5

    1b826fa3fd70a529623ed1267944cee5

  • SHA1

    7dd2c7bff7a1ed10824fdaa77236427ef4a4a26f

  • SHA256

    72af72976c78e6002122e416832729f59c0ba9dbc45956bce08ee1dd4ee81ce2

  • SHA512

    e64966b396ddded2c989888994aa187dcb3f042d86c1b07a2e7a3d86ae1c195adeeb156f06505902c84eeb2682855e15db9a77736b1d6b3c8fb64964b44e3f09

Malware Config

Targets

    • Target

      72af72976c78e6002122e416832729f59c0ba9dbc45956bce08ee1dd4ee81ce2

    • Size

      89KB

    • MD5

      1b826fa3fd70a529623ed1267944cee5

    • SHA1

      7dd2c7bff7a1ed10824fdaa77236427ef4a4a26f

    • SHA256

      72af72976c78e6002122e416832729f59c0ba9dbc45956bce08ee1dd4ee81ce2

    • SHA512

      e64966b396ddded2c989888994aa187dcb3f042d86c1b07a2e7a3d86ae1c195adeeb156f06505902c84eeb2682855e15db9a77736b1d6b3c8fb64964b44e3f09

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks