General

  • Target

    1584e271fa2fab5b9839d43e9a4ca94d034406071cfd22b594d30b33d75278c7

  • Size

    188KB

  • Sample

    220212-extdwsheam

  • MD5

    b4fa6064fe905db0dd7c46e0b9062116

  • SHA1

    72b41854a595493004bc22276503f0d32f3e2f95

  • SHA256

    1584e271fa2fab5b9839d43e9a4ca94d034406071cfd22b594d30b33d75278c7

  • SHA512

    511fcaea75339edd4e619c061aebec87a0c58392800455cfe01e7f080991b5e8b23c613c10542747e1a4dfffae5d4fcaf6fd12a350173fb28edf91a232ccda35

Malware Config

Targets

    • Target

      1584e271fa2fab5b9839d43e9a4ca94d034406071cfd22b594d30b33d75278c7

    • Size

      188KB

    • MD5

      b4fa6064fe905db0dd7c46e0b9062116

    • SHA1

      72b41854a595493004bc22276503f0d32f3e2f95

    • SHA256

      1584e271fa2fab5b9839d43e9a4ca94d034406071cfd22b594d30b33d75278c7

    • SHA512

      511fcaea75339edd4e619c061aebec87a0c58392800455cfe01e7f080991b5e8b23c613c10542747e1a4dfffae5d4fcaf6fd12a350173fb28edf91a232ccda35

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks