General

  • Target

    15d13891551a60b6867b3d8d81441b8aeaa419a240187feb1c8fd736b72cea23

  • Size

    176KB

  • Sample

    220212-esgjjahddq

  • MD5

    936b9e162e1148d04c8d51e3decdbb42

  • SHA1

    48112711b7b804326fd270d8b61e38792cf9bebe

  • SHA256

    15d13891551a60b6867b3d8d81441b8aeaa419a240187feb1c8fd736b72cea23

  • SHA512

    8d905e4ef4dd8373fd10eef878d3a999b93b7777a8180b1620f8c5d81cc5b0409dab4563d083b647cef0c82d10f6749b8163f8422b627c596cd821d3fbe7e9c7

Malware Config

Targets

    • Target

      15d13891551a60b6867b3d8d81441b8aeaa419a240187feb1c8fd736b72cea23

    • Size

      176KB

    • MD5

      936b9e162e1148d04c8d51e3decdbb42

    • SHA1

      48112711b7b804326fd270d8b61e38792cf9bebe

    • SHA256

      15d13891551a60b6867b3d8d81441b8aeaa419a240187feb1c8fd736b72cea23

    • SHA512

      8d905e4ef4dd8373fd10eef878d3a999b93b7777a8180b1620f8c5d81cc5b0409dab4563d083b647cef0c82d10f6749b8163f8422b627c596cd821d3fbe7e9c7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks