General

  • Target

    174eac37d9e1f78456358b693fa4e09d34c414d9ced339ec4f4fe38e3399b67a

  • Size

    150KB

  • Sample

    220212-d4wl6ahafn

  • MD5

    2dfc5b43a8f8bfa6df7c2de29f8433a8

  • SHA1

    7710d32de2a3c265228f878fcc38bb375db66376

  • SHA256

    174eac37d9e1f78456358b693fa4e09d34c414d9ced339ec4f4fe38e3399b67a

  • SHA512

    bb2de9e25d1736da642334dc81527d18acc4251846ff83ba72ebb33fd8ae55d5248ed76808af006644f11f1db01bfc6bd982bc3144724c0ae6244f7ce882f498

Malware Config

Targets

    • Target

      174eac37d9e1f78456358b693fa4e09d34c414d9ced339ec4f4fe38e3399b67a

    • Size

      150KB

    • MD5

      2dfc5b43a8f8bfa6df7c2de29f8433a8

    • SHA1

      7710d32de2a3c265228f878fcc38bb375db66376

    • SHA256

      174eac37d9e1f78456358b693fa4e09d34c414d9ced339ec4f4fe38e3399b67a

    • SHA512

      bb2de9e25d1736da642334dc81527d18acc4251846ff83ba72ebb33fd8ae55d5248ed76808af006644f11f1db01bfc6bd982bc3144724c0ae6244f7ce882f498

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks