General

  • Target

    17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78

  • Size

    150KB

  • Sample

    220212-dv7m3aghgk

  • MD5

    f7513a15cbb46ea29462a854481c6b2a

  • SHA1

    288f0e97e6af5da30a2a3fcac5bbebe251831eea

  • SHA256

    17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78

  • SHA512

    b0f1855a016dab5cc542ada568a98cee3b258aa7d76b7693034429cbc5228821e43820804e1be580781c55cb3ed1907d06c4e2ec448c2b6793886c2efdef0fb8

Malware Config

Targets

    • Target

      17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78

    • Size

      150KB

    • MD5

      f7513a15cbb46ea29462a854481c6b2a

    • SHA1

      288f0e97e6af5da30a2a3fcac5bbebe251831eea

    • SHA256

      17dcc854d55e70c41c20868d35e4f2f486d2d802e24ddb33361a711ea48bda78

    • SHA512

      b0f1855a016dab5cc542ada568a98cee3b258aa7d76b7693034429cbc5228821e43820804e1be580781c55cb3ed1907d06c4e2ec448c2b6793886c2efdef0fb8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks