General

  • Target

    15e8f2277d02b9c15f4928921539d06b12e3175f0e324e12c2d931ed0f81497c

  • Size

    92KB

  • Sample

    220212-eq6qmshdck

  • MD5

    bea8226ad6e68e053ea42b765dc8d77b

  • SHA1

    5005a5ff6c0f167054994372aa45a3e8eac66ed3

  • SHA256

    15e8f2277d02b9c15f4928921539d06b12e3175f0e324e12c2d931ed0f81497c

  • SHA512

    829e5b6e72c37e953465d6448be172de602b8510dfe9a61e0334a553a6ac5922343a8e4d5cc4169c69afb4af8f3d4b3a72aa9890186f0814add808a4fd3807b5

Malware Config

Targets

    • Target

      15e8f2277d02b9c15f4928921539d06b12e3175f0e324e12c2d931ed0f81497c

    • Size

      92KB

    • MD5

      bea8226ad6e68e053ea42b765dc8d77b

    • SHA1

      5005a5ff6c0f167054994372aa45a3e8eac66ed3

    • SHA256

      15e8f2277d02b9c15f4928921539d06b12e3175f0e324e12c2d931ed0f81497c

    • SHA512

      829e5b6e72c37e953465d6448be172de602b8510dfe9a61e0334a553a6ac5922343a8e4d5cc4169c69afb4af8f3d4b3a72aa9890186f0814add808a4fd3807b5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks