General

  • Target

    178bbd4e2c03e0398088422a4dbcc9ce2e2133a178254e8ce5c6eed51e726ce5

  • Size

    176KB

  • Sample

    220212-d1y8wahacq

  • MD5

    d207063cb61319c0b975cf25265aaeac

  • SHA1

    c0031871ec1d757838d21e61672401772ddbb3db

  • SHA256

    178bbd4e2c03e0398088422a4dbcc9ce2e2133a178254e8ce5c6eed51e726ce5

  • SHA512

    aaa105b1a39a6c9f17f83010229f5f6d2eb425a1b75e38f53aea49a53e9a8bc0f44b9ec52c188030b11ac60950682b0a1ae3a193396f90351d7f7039172fb946

Malware Config

Targets

    • Target

      178bbd4e2c03e0398088422a4dbcc9ce2e2133a178254e8ce5c6eed51e726ce5

    • Size

      176KB

    • MD5

      d207063cb61319c0b975cf25265aaeac

    • SHA1

      c0031871ec1d757838d21e61672401772ddbb3db

    • SHA256

      178bbd4e2c03e0398088422a4dbcc9ce2e2133a178254e8ce5c6eed51e726ce5

    • SHA512

      aaa105b1a39a6c9f17f83010229f5f6d2eb425a1b75e38f53aea49a53e9a8bc0f44b9ec52c188030b11ac60950682b0a1ae3a193396f90351d7f7039172fb946

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks