General

  • Target

    1922961d7f8c78c5f6bbe2af9de8707ad1db8062793065bd6d0d8a0a77dbd799

  • Size

    176KB

  • Sample

    220212-ddzwwsgfgr

  • MD5

    f4212ce853b8fe7ef808994f43ea70ec

  • SHA1

    b8138da1facfdb85997d66e2c9e1765caa53769b

  • SHA256

    1922961d7f8c78c5f6bbe2af9de8707ad1db8062793065bd6d0d8a0a77dbd799

  • SHA512

    9490f9a3ddbabf667968f09566025795bf719589d44b25ecbcec90c09edb3c6a6676d89f7539de9fb1e55395fae8d8580d998bae3ec79f8a36a246b9cfc8b97a

Malware Config

Targets

    • Target

      1922961d7f8c78c5f6bbe2af9de8707ad1db8062793065bd6d0d8a0a77dbd799

    • Size

      176KB

    • MD5

      f4212ce853b8fe7ef808994f43ea70ec

    • SHA1

      b8138da1facfdb85997d66e2c9e1765caa53769b

    • SHA256

      1922961d7f8c78c5f6bbe2af9de8707ad1db8062793065bd6d0d8a0a77dbd799

    • SHA512

      9490f9a3ddbabf667968f09566025795bf719589d44b25ecbcec90c09edb3c6a6676d89f7539de9fb1e55395fae8d8580d998bae3ec79f8a36a246b9cfc8b97a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks