General

  • Target

    16dd2bfa00dd92f503651a038ba36878b2d63b9343497c5c01015590ffa084fb

  • Size

    89KB

  • Sample

    220212-ea7b8shbej

  • MD5

    ccc32939a4e6e90a1c46d5b72f03623b

  • SHA1

    3648c8fedece9cf7ed13327581901359984b5b01

  • SHA256

    16dd2bfa00dd92f503651a038ba36878b2d63b9343497c5c01015590ffa084fb

  • SHA512

    1bfbaf651520055e66570f72375fb7110824ab2637378de1a2ae9030f0eb49fdb730f474eef863e1bd76d3e645e1292e2d8cb0d32774e39da167290d616c3837

Malware Config

Targets

    • Target

      16dd2bfa00dd92f503651a038ba36878b2d63b9343497c5c01015590ffa084fb

    • Size

      89KB

    • MD5

      ccc32939a4e6e90a1c46d5b72f03623b

    • SHA1

      3648c8fedece9cf7ed13327581901359984b5b01

    • SHA256

      16dd2bfa00dd92f503651a038ba36878b2d63b9343497c5c01015590ffa084fb

    • SHA512

      1bfbaf651520055e66570f72375fb7110824ab2637378de1a2ae9030f0eb49fdb730f474eef863e1bd76d3e645e1292e2d8cb0d32774e39da167290d616c3837

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks