General

  • Target

    59a7c19afa4baa80c90eec1a6f21311983029e923d1b0a483daf206dab991fc4

  • Size

    123KB

  • Sample

    220131-bflqyadabm

  • MD5

    07b62497e41898c22e5d5351607aac8e

  • SHA1

    d85860554ea5718bbcbe877c1310c301a8d2d2ad

  • SHA256

    59a7c19afa4baa80c90eec1a6f21311983029e923d1b0a483daf206dab991fc4

  • SHA512

    72e32b134e72ba1b1bca0e6faa79c40e1f76766faefb11995788f26e2289f0aa32a2a1fde9db0a6037ccbfc8cebbc83118ee4199679719c239230c0dd7b6a28a

Malware Config

Targets

    • Target

      59a7c19afa4baa80c90eec1a6f21311983029e923d1b0a483daf206dab991fc4

    • Size

      123KB

    • MD5

      07b62497e41898c22e5d5351607aac8e

    • SHA1

      d85860554ea5718bbcbe877c1310c301a8d2d2ad

    • SHA256

      59a7c19afa4baa80c90eec1a6f21311983029e923d1b0a483daf206dab991fc4

    • SHA512

      72e32b134e72ba1b1bca0e6faa79c40e1f76766faefb11995788f26e2289f0aa32a2a1fde9db0a6037ccbfc8cebbc83118ee4199679719c239230c0dd7b6a28a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks