General

  • Target

    15caaa27a337d3e7b553bf6aa87d5ac6eb98300a2700c0885a40db828710dbee

  • Size

    89KB

  • Sample

    220212-esyg2shdek

  • MD5

    229b867beabfa1d554202c9bd2167619

  • SHA1

    186340f605e1e0a041143b667c4424b0e21d1bb0

  • SHA256

    15caaa27a337d3e7b553bf6aa87d5ac6eb98300a2700c0885a40db828710dbee

  • SHA512

    fdbaa74368eae634003bc3c6aae3c7eea85eb9e11286b9e753ec494e4520c6ffe792aceed4147043b94059871f32c187abbc13d067732115234c75cde0ecb224

Malware Config

Targets

    • Target

      15caaa27a337d3e7b553bf6aa87d5ac6eb98300a2700c0885a40db828710dbee

    • Size

      89KB

    • MD5

      229b867beabfa1d554202c9bd2167619

    • SHA1

      186340f605e1e0a041143b667c4424b0e21d1bb0

    • SHA256

      15caaa27a337d3e7b553bf6aa87d5ac6eb98300a2700c0885a40db828710dbee

    • SHA512

      fdbaa74368eae634003bc3c6aae3c7eea85eb9e11286b9e753ec494e4520c6ffe792aceed4147043b94059871f32c187abbc13d067732115234c75cde0ecb224

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks