General

  • Target

    15c86572a632f85dc3f3ffac959a06437d083e8370d473111741ebea6cffe429

  • Size

    176KB

  • Sample

    220212-es72gshdem

  • MD5

    78e0d62e1c30a3735dc646a462494cc6

  • SHA1

    f7051f36540169f9b2fae2a117816f9d748eff22

  • SHA256

    15c86572a632f85dc3f3ffac959a06437d083e8370d473111741ebea6cffe429

  • SHA512

    624030db838742b66c01bafca65c09ea7e344ef023e14531f7cb57332dd21506d8e85b7bc65cdda834596ade11c7399700034afb28803a706041543ffdf9c655

Malware Config

Targets

    • Target

      15c86572a632f85dc3f3ffac959a06437d083e8370d473111741ebea6cffe429

    • Size

      176KB

    • MD5

      78e0d62e1c30a3735dc646a462494cc6

    • SHA1

      f7051f36540169f9b2fae2a117816f9d748eff22

    • SHA256

      15c86572a632f85dc3f3ffac959a06437d083e8370d473111741ebea6cffe429

    • SHA512

      624030db838742b66c01bafca65c09ea7e344ef023e14531f7cb57332dd21506d8e85b7bc65cdda834596ade11c7399700034afb28803a706041543ffdf9c655

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks