General

  • Target

    1605017c4931cabc4054ea7aae9f40f3ee0f2b6b152eb10ce6a71ebdc19ed52b

  • Size

    150KB

  • Sample

    220212-eps36ahdbj

  • MD5

    bb6b456b245b3667f2bae856f2041e57

  • SHA1

    90d6377e0ab1ab05c163794e110efb889bf2f56a

  • SHA256

    1605017c4931cabc4054ea7aae9f40f3ee0f2b6b152eb10ce6a71ebdc19ed52b

  • SHA512

    a3a0e207e5ca7753bf70e4749c134b7a0b1a73f881c99aaabf27aece6babb42066cdf3af97ef0b7279acef9871ec4cfc5db27f8d1eaf5fad2620c34fb8b0d5e0

Malware Config

Targets

    • Target

      1605017c4931cabc4054ea7aae9f40f3ee0f2b6b152eb10ce6a71ebdc19ed52b

    • Size

      150KB

    • MD5

      bb6b456b245b3667f2bae856f2041e57

    • SHA1

      90d6377e0ab1ab05c163794e110efb889bf2f56a

    • SHA256

      1605017c4931cabc4054ea7aae9f40f3ee0f2b6b152eb10ce6a71ebdc19ed52b

    • SHA512

      a3a0e207e5ca7753bf70e4749c134b7a0b1a73f881c99aaabf27aece6babb42066cdf3af97ef0b7279acef9871ec4cfc5db27f8d1eaf5fad2620c34fb8b0d5e0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks