General

  • Target

    15025433ae5f4af8c6507efe8cadac786fb54870ed6bec2c77d430ef6fb00a53

  • Size

    176KB

  • Sample

    220212-e85w3ahfbk

  • MD5

    ecd5c686a45a037747da171cafd5fc99

  • SHA1

    682c5bcf48f4c419324a5910e8d38e88f239f849

  • SHA256

    15025433ae5f4af8c6507efe8cadac786fb54870ed6bec2c77d430ef6fb00a53

  • SHA512

    7b153304938f9dbe38543fd0d5e7b0585af995bf7324e3fb768acf20225b663f1790fd81c61f31f6b74029b7a9f3ff52e9c6c2dba18560e324ccfd1a1598de2c

Malware Config

Targets

    • Target

      15025433ae5f4af8c6507efe8cadac786fb54870ed6bec2c77d430ef6fb00a53

    • Size

      176KB

    • MD5

      ecd5c686a45a037747da171cafd5fc99

    • SHA1

      682c5bcf48f4c419324a5910e8d38e88f239f849

    • SHA256

      15025433ae5f4af8c6507efe8cadac786fb54870ed6bec2c77d430ef6fb00a53

    • SHA512

      7b153304938f9dbe38543fd0d5e7b0585af995bf7324e3fb768acf20225b663f1790fd81c61f31f6b74029b7a9f3ff52e9c6c2dba18560e324ccfd1a1598de2c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks