General

  • Target

    130d5daf59e67d9056dfd0bfc7184ce7b4923c2df062de0da6a867dcc9f546df

  • Size

    150KB

  • Sample

    220212-f1almaaacn

  • MD5

    86686c92fc09e04c4b0e1c7700f5aa52

  • SHA1

    25aad0e6f5aa1c89ebe0468e6d97163611fe72f6

  • SHA256

    130d5daf59e67d9056dfd0bfc7184ce7b4923c2df062de0da6a867dcc9f546df

  • SHA512

    424b698b7ba4c731a706e46139a705131bb015bf5bb27e60f69ad9fe233b2ed1fbdb4eff743379984a963df75f371b28032c7b2e54bd247258ae23a037bbd63a

Malware Config

Targets

    • Target

      130d5daf59e67d9056dfd0bfc7184ce7b4923c2df062de0da6a867dcc9f546df

    • Size

      150KB

    • MD5

      86686c92fc09e04c4b0e1c7700f5aa52

    • SHA1

      25aad0e6f5aa1c89ebe0468e6d97163611fe72f6

    • SHA256

      130d5daf59e67d9056dfd0bfc7184ce7b4923c2df062de0da6a867dcc9f546df

    • SHA512

      424b698b7ba4c731a706e46139a705131bb015bf5bb27e60f69ad9fe233b2ed1fbdb4eff743379984a963df75f371b28032c7b2e54bd247258ae23a037bbd63a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks