General

  • Target

    165a5a61d5354a19c6fc5f209f74bc3d3f6ff4ec44d407d881be494b97c3a6f1

  • Size

    176KB

  • Sample

    220212-ej6gashcej

  • MD5

    97aca3a349cb5ea5d7f2c55789311f1f

  • SHA1

    1bf3a1b7c36fc619a07e3a5acbba3e70ad1403fa

  • SHA256

    165a5a61d5354a19c6fc5f209f74bc3d3f6ff4ec44d407d881be494b97c3a6f1

  • SHA512

    9982f9edddc5d3133895da6498b316233d31518a4e170c0149e9d33efca1519145f6800be3483991603e0fc67c0091bbbacc91003a331b38a37f3a27a94d9144

Malware Config

Targets

    • Target

      165a5a61d5354a19c6fc5f209f74bc3d3f6ff4ec44d407d881be494b97c3a6f1

    • Size

      176KB

    • MD5

      97aca3a349cb5ea5d7f2c55789311f1f

    • SHA1

      1bf3a1b7c36fc619a07e3a5acbba3e70ad1403fa

    • SHA256

      165a5a61d5354a19c6fc5f209f74bc3d3f6ff4ec44d407d881be494b97c3a6f1

    • SHA512

      9982f9edddc5d3133895da6498b316233d31518a4e170c0149e9d33efca1519145f6800be3483991603e0fc67c0091bbbacc91003a331b38a37f3a27a94d9144

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks