General

  • Target

    1881c151bf2e93ddb7115f26e1decbbff9baaa49f7d98730928ba49f56f31731

  • Size

    150KB

  • Sample

    220212-dmpsaagggm

  • MD5

    4cd4742383fa00711915dfb199ffb946

  • SHA1

    e060884ece39535e7f9a384f4a18bd00738798d5

  • SHA256

    1881c151bf2e93ddb7115f26e1decbbff9baaa49f7d98730928ba49f56f31731

  • SHA512

    6a7bb305af35d489abbc46f149de7e335ad4e46e7f1f249186e5d5b7007673d47aa153d08a9b14f0aa02a670fc8a683a64513b2ba542e44b4845ca30c9bda597

Malware Config

Targets

    • Target

      1881c151bf2e93ddb7115f26e1decbbff9baaa49f7d98730928ba49f56f31731

    • Size

      150KB

    • MD5

      4cd4742383fa00711915dfb199ffb946

    • SHA1

      e060884ece39535e7f9a384f4a18bd00738798d5

    • SHA256

      1881c151bf2e93ddb7115f26e1decbbff9baaa49f7d98730928ba49f56f31731

    • SHA512

      6a7bb305af35d489abbc46f149de7e335ad4e46e7f1f249186e5d5b7007673d47aa153d08a9b14f0aa02a670fc8a683a64513b2ba542e44b4845ca30c9bda597

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks