General

  • Target

    1615c486610a0ecd9e3da9e24e7ed102e1b3365da3097374bc914609335d059b

  • Size

    92KB

  • Sample

    220212-enmvrahchq

  • MD5

    6c97b3d4497e01f2ea87862f36ea3b24

  • SHA1

    33d63cab2248541cc2b6851a40f9fc230577ef98

  • SHA256

    1615c486610a0ecd9e3da9e24e7ed102e1b3365da3097374bc914609335d059b

  • SHA512

    183af97dd88859bfdfbd0c15ab2573008ef74053cb4e2b05d8506116d8b93465e78b03efc6119dc3c9d40276266f66469b4b9a3aaa3e456f3fe8b342d6cc8ef7

Malware Config

Targets

    • Target

      1615c486610a0ecd9e3da9e24e7ed102e1b3365da3097374bc914609335d059b

    • Size

      92KB

    • MD5

      6c97b3d4497e01f2ea87862f36ea3b24

    • SHA1

      33d63cab2248541cc2b6851a40f9fc230577ef98

    • SHA256

      1615c486610a0ecd9e3da9e24e7ed102e1b3365da3097374bc914609335d059b

    • SHA512

      183af97dd88859bfdfbd0c15ab2573008ef74053cb4e2b05d8506116d8b93465e78b03efc6119dc3c9d40276266f66469b4b9a3aaa3e456f3fe8b342d6cc8ef7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks