General

  • Target

    170df436cbaae5a8e27991851b5e49d7ec86553bde7ac0131a5553c124bcac8a

  • Size

    150KB

  • Sample

    220212-d7p9jshbam

  • MD5

    afcfbdd872fb8f28797ad14d59740d78

  • SHA1

    c3995768351de6c497865a4e2500b220e2767c7d

  • SHA256

    170df436cbaae5a8e27991851b5e49d7ec86553bde7ac0131a5553c124bcac8a

  • SHA512

    32e1f87ca65a87be4eeb2956e09d926f1c5088c5f657421ce8e350b26a00688fb62572866973cdfa448542f42de29158c72435644787e01639db9a3333c09080

Malware Config

Targets

    • Target

      170df436cbaae5a8e27991851b5e49d7ec86553bde7ac0131a5553c124bcac8a

    • Size

      150KB

    • MD5

      afcfbdd872fb8f28797ad14d59740d78

    • SHA1

      c3995768351de6c497865a4e2500b220e2767c7d

    • SHA256

      170df436cbaae5a8e27991851b5e49d7ec86553bde7ac0131a5553c124bcac8a

    • SHA512

      32e1f87ca65a87be4eeb2956e09d926f1c5088c5f657421ce8e350b26a00688fb62572866973cdfa448542f42de29158c72435644787e01639db9a3333c09080

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks