General

  • Target

    1530e959ab27b326a268079b257899d6fabe8a3c154145cb09027086b1958b16

  • Size

    89KB

  • Sample

    220212-e6qpcshefp

  • MD5

    c5b1454520e27ded78b5e1a5415c4f46

  • SHA1

    50b71118db1af81772f6fe64398afd9fd36f57d0

  • SHA256

    1530e959ab27b326a268079b257899d6fabe8a3c154145cb09027086b1958b16

  • SHA512

    87c31107e29fbced83d244b401e16fd6577a419388a97e8e850e91c719de4ea83cd88cc223d3e4dc53ba5d15bc7aa7be2ee16d40831d3f05fc8b8b24be334ac7

Malware Config

Targets

    • Target

      1530e959ab27b326a268079b257899d6fabe8a3c154145cb09027086b1958b16

    • Size

      89KB

    • MD5

      c5b1454520e27ded78b5e1a5415c4f46

    • SHA1

      50b71118db1af81772f6fe64398afd9fd36f57d0

    • SHA256

      1530e959ab27b326a268079b257899d6fabe8a3c154145cb09027086b1958b16

    • SHA512

      87c31107e29fbced83d244b401e16fd6577a419388a97e8e850e91c719de4ea83cd88cc223d3e4dc53ba5d15bc7aa7be2ee16d40831d3f05fc8b8b24be334ac7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks