General

  • Target

    16326f6582c0f7994c0bbc687bcffc0add9581f8eaca548f21753113610c7c93

  • Size

    89KB

  • Sample

    220212-elt62shcfm

  • MD5

    21ff66a732a6bf81533c00fee8ef5d5a

  • SHA1

    40cb0a33bad41272d732e32dd792bb12df4556a0

  • SHA256

    16326f6582c0f7994c0bbc687bcffc0add9581f8eaca548f21753113610c7c93

  • SHA512

    b1be6a3ca08d8e2f3a9c59445d0ff9f307cdf0fb15486d0ed36ac72b580754a63995335b2b43b9b4f5053cb098c19f625551ccaf7b6a00d6283466456b41afe8

Malware Config

Targets

    • Target

      16326f6582c0f7994c0bbc687bcffc0add9581f8eaca548f21753113610c7c93

    • Size

      89KB

    • MD5

      21ff66a732a6bf81533c00fee8ef5d5a

    • SHA1

      40cb0a33bad41272d732e32dd792bb12df4556a0

    • SHA256

      16326f6582c0f7994c0bbc687bcffc0add9581f8eaca548f21753113610c7c93

    • SHA512

      b1be6a3ca08d8e2f3a9c59445d0ff9f307cdf0fb15486d0ed36ac72b580754a63995335b2b43b9b4f5053cb098c19f625551ccaf7b6a00d6283466456b41afe8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks