General

  • Target

    15609cfa17186f68a3ce473773b17fe3ed3566cc0dc13d46e4f7462f4a96ff4c

  • Size

    150KB

  • Sample

    220212-e1bcgshecp

  • MD5

    a706745f4a4c31203ef98a8aee70baca

  • SHA1

    3658bc73deb9a265fcb987d30fc4ce9b6a380922

  • SHA256

    15609cfa17186f68a3ce473773b17fe3ed3566cc0dc13d46e4f7462f4a96ff4c

  • SHA512

    120a1f2776e79453f897b07492b3271fbbd3c66e7ad7097e0bdfe8e35eb637ebfb85a38e96b394b01917a72ffa50ab18222ce843a31b2da1ccb3df378e6faf76

Malware Config

Targets

    • Target

      15609cfa17186f68a3ce473773b17fe3ed3566cc0dc13d46e4f7462f4a96ff4c

    • Size

      150KB

    • MD5

      a706745f4a4c31203ef98a8aee70baca

    • SHA1

      3658bc73deb9a265fcb987d30fc4ce9b6a380922

    • SHA256

      15609cfa17186f68a3ce473773b17fe3ed3566cc0dc13d46e4f7462f4a96ff4c

    • SHA512

      120a1f2776e79453f897b07492b3271fbbd3c66e7ad7097e0bdfe8e35eb637ebfb85a38e96b394b01917a72ffa50ab18222ce843a31b2da1ccb3df378e6faf76

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks