General

  • Target

    15447e65703a5a55e28a88a44a9def686989266dfb0bdbe0f945052439955ee8

  • Size

    150KB

  • Sample

    220212-e25bysheen

  • MD5

    935c25b1cf3e9211179cf08586492c39

  • SHA1

    3ed3909ae7da984846ded95d5ac078f7b789bee2

  • SHA256

    15447e65703a5a55e28a88a44a9def686989266dfb0bdbe0f945052439955ee8

  • SHA512

    a46ab463e0da70dc154f237eeae11c99f871cff02e45c4a2e38ada06b126a8c6fc599762db2f84979bef73a199089fc35e2224585bdef7e322a1a1c8bcd51255

Malware Config

Targets

    • Target

      15447e65703a5a55e28a88a44a9def686989266dfb0bdbe0f945052439955ee8

    • Size

      150KB

    • MD5

      935c25b1cf3e9211179cf08586492c39

    • SHA1

      3ed3909ae7da984846ded95d5ac078f7b789bee2

    • SHA256

      15447e65703a5a55e28a88a44a9def686989266dfb0bdbe0f945052439955ee8

    • SHA512

      a46ab463e0da70dc154f237eeae11c99f871cff02e45c4a2e38ada06b126a8c6fc599762db2f84979bef73a199089fc35e2224585bdef7e322a1a1c8bcd51255

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks