General

  • Target

    8c5de270f88fb59258ac10534597be7f59c38a0df133d241d30f655b0895724a

  • Size

    89KB

  • Sample

    220131-bjm36sdafj

  • MD5

    05cd4bfeac3ad6144b5f5023277afa45

  • SHA1

    ae9e3e8a4d21a61679e9d93720a21aaee55fc5d1

  • SHA256

    8c5de270f88fb59258ac10534597be7f59c38a0df133d241d30f655b0895724a

  • SHA512

    a48e20ed30ec2fdd5eb83baae6c689aa44ad39cd86840ce300191a86e29f5bdc7c0cca6bec29bcd3563ddba25ea26572e8d46d1f5e9cc7b7625084eaca6b00ce

Malware Config

Targets

    • Target

      8c5de270f88fb59258ac10534597be7f59c38a0df133d241d30f655b0895724a

    • Size

      89KB

    • MD5

      05cd4bfeac3ad6144b5f5023277afa45

    • SHA1

      ae9e3e8a4d21a61679e9d93720a21aaee55fc5d1

    • SHA256

      8c5de270f88fb59258ac10534597be7f59c38a0df133d241d30f655b0895724a

    • SHA512

      a48e20ed30ec2fdd5eb83baae6c689aa44ad39cd86840ce300191a86e29f5bdc7c0cca6bec29bcd3563ddba25ea26572e8d46d1f5e9cc7b7625084eaca6b00ce

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks