General

  • Target

    1936210760bd632c19126d7161f1919a986db9bbe89f020fdd5ace5c03a548d9

  • Size

    152KB

  • Sample

    220212-dc8gmsgfgj

  • MD5

    5800817e3131dbb394ec0af5f9654355

  • SHA1

    c98488a6b5eb433ec19e3b3aac883e3db2db6be0

  • SHA256

    1936210760bd632c19126d7161f1919a986db9bbe89f020fdd5ace5c03a548d9

  • SHA512

    98c28ec10e895eff2bbc5279993a56ae607db9a1dc759a9da9d55023abdcb1f0ee553fb20082abe51e4a5bf56321b8734cf7a9cd4892436b91978cba8c555cbb

Malware Config

Targets

    • Target

      1936210760bd632c19126d7161f1919a986db9bbe89f020fdd5ace5c03a548d9

    • Size

      152KB

    • MD5

      5800817e3131dbb394ec0af5f9654355

    • SHA1

      c98488a6b5eb433ec19e3b3aac883e3db2db6be0

    • SHA256

      1936210760bd632c19126d7161f1919a986db9bbe89f020fdd5ace5c03a548d9

    • SHA512

      98c28ec10e895eff2bbc5279993a56ae607db9a1dc759a9da9d55023abdcb1f0ee553fb20082abe51e4a5bf56321b8734cf7a9cd4892436b91978cba8c555cbb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks