General

  • Target

    16f8256c1c9368c94a92f88aff659e1a1dded14478f7d420f69568c268832083

  • Size

    150KB

  • Sample

    220212-d8832shbbr

  • MD5

    4a42efd403a045b1417551cf3709dee7

  • SHA1

    3bae8b9af98458fa09a9fe9c23fdc4d5e9aed4d5

  • SHA256

    16f8256c1c9368c94a92f88aff659e1a1dded14478f7d420f69568c268832083

  • SHA512

    ad623803750f51253f42ce58a9a1c9631a4251a6c008521fd73311b25ba609a584416465b3b033742ac8945a0da9c89480634bc01876cce83f623c7558c2f09d

Malware Config

Targets

    • Target

      16f8256c1c9368c94a92f88aff659e1a1dded14478f7d420f69568c268832083

    • Size

      150KB

    • MD5

      4a42efd403a045b1417551cf3709dee7

    • SHA1

      3bae8b9af98458fa09a9fe9c23fdc4d5e9aed4d5

    • SHA256

      16f8256c1c9368c94a92f88aff659e1a1dded14478f7d420f69568c268832083

    • SHA512

      ad623803750f51253f42ce58a9a1c9631a4251a6c008521fd73311b25ba609a584416465b3b033742ac8945a0da9c89480634bc01876cce83f623c7558c2f09d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks