General

  • Target

    15a29c80c9775f9f5a72aefd2308441985bfe1c3dc9f42b056311c728ded1e45

  • Size

    188KB

  • Sample

    220212-ewdbaahdgr

  • MD5

    d0995ed6207bdd99b19eec5a8bc34359

  • SHA1

    7baf161e46c632508c9d7e9a5e0d74ea4984d7ef

  • SHA256

    15a29c80c9775f9f5a72aefd2308441985bfe1c3dc9f42b056311c728ded1e45

  • SHA512

    0e147f51f815ad69e1b2a5b95dfa4ea77d72f93905b81819225e54a9b3b2b1acbd6e1158c6d962d3933e98cca24dbf33136bc8b63f32d8e9595798cf06ed8aaa

Malware Config

Targets

    • Target

      15a29c80c9775f9f5a72aefd2308441985bfe1c3dc9f42b056311c728ded1e45

    • Size

      188KB

    • MD5

      d0995ed6207bdd99b19eec5a8bc34359

    • SHA1

      7baf161e46c632508c9d7e9a5e0d74ea4984d7ef

    • SHA256

      15a29c80c9775f9f5a72aefd2308441985bfe1c3dc9f42b056311c728ded1e45

    • SHA512

      0e147f51f815ad69e1b2a5b95dfa4ea77d72f93905b81819225e54a9b3b2b1acbd6e1158c6d962d3933e98cca24dbf33136bc8b63f32d8e9595798cf06ed8aaa

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks