General

  • Target

    15a84a9a0cdab9e372d245962c0c9b8b6bd3eb3dc44ebfb9b90d2165ab468dc8

  • Size

    89KB

  • Sample

    220212-evv5pshdgl

  • MD5

    29bb238ad8c9b35cd0360e1090ef7135

  • SHA1

    8b7d5362ea119819defca267c1fb061631b04c57

  • SHA256

    15a84a9a0cdab9e372d245962c0c9b8b6bd3eb3dc44ebfb9b90d2165ab468dc8

  • SHA512

    64eaec3333dad77a0d5731c575b40bc0f73c3add458ed3d55a5f44e7d531bbd495627f9820d5b0e628d83c8392e47b3e1378dd72429a36d6f18531b78588809b

Malware Config

Targets

    • Target

      15a84a9a0cdab9e372d245962c0c9b8b6bd3eb3dc44ebfb9b90d2165ab468dc8

    • Size

      89KB

    • MD5

      29bb238ad8c9b35cd0360e1090ef7135

    • SHA1

      8b7d5362ea119819defca267c1fb061631b04c57

    • SHA256

      15a84a9a0cdab9e372d245962c0c9b8b6bd3eb3dc44ebfb9b90d2165ab468dc8

    • SHA512

      64eaec3333dad77a0d5731c575b40bc0f73c3add458ed3d55a5f44e7d531bbd495627f9820d5b0e628d83c8392e47b3e1378dd72429a36d6f18531b78588809b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks