General

  • Target

    161cab33db6eeebeaef9bab1e6deb5ee2ea7ce229c8f498c6cd7d58e9c06e748

  • Size

    150KB

  • Sample

    220212-emwfhahcgq

  • MD5

    507589a24c936f64d3179b6bde988ba3

  • SHA1

    99dd6de9698c32a4a20ab2a325cf2039ffe2cccd

  • SHA256

    161cab33db6eeebeaef9bab1e6deb5ee2ea7ce229c8f498c6cd7d58e9c06e748

  • SHA512

    ac997c24f41cdc7077972a1ae8f5f0dcae4a761dd6bf8068e7a1179d694e9c1af700907a0d53b5e12def29753d1d4fd12a8c85544986b467b2145951a9c8e3e5

Malware Config

Targets

    • Target

      161cab33db6eeebeaef9bab1e6deb5ee2ea7ce229c8f498c6cd7d58e9c06e748

    • Size

      150KB

    • MD5

      507589a24c936f64d3179b6bde988ba3

    • SHA1

      99dd6de9698c32a4a20ab2a325cf2039ffe2cccd

    • SHA256

      161cab33db6eeebeaef9bab1e6deb5ee2ea7ce229c8f498c6cd7d58e9c06e748

    • SHA512

      ac997c24f41cdc7077972a1ae8f5f0dcae4a761dd6bf8068e7a1179d694e9c1af700907a0d53b5e12def29753d1d4fd12a8c85544986b467b2145951a9c8e3e5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks