General

  • Target

    130d4b6c793fc55eced89a0354e94a57351de4ec3671dd77cfb989de5d1783e8

  • Size

    92KB

  • Sample

    220212-f1cqzsaacp

  • MD5

    28c1812243aba835ecb3fc2d54aab421

  • SHA1

    43333a4b07bc2cd85464bef8063bcb7d87c998a7

  • SHA256

    130d4b6c793fc55eced89a0354e94a57351de4ec3671dd77cfb989de5d1783e8

  • SHA512

    5a0c1cc0ed8fcb6f5c881affe4c8e99f516094aa3eb3ea8ef6ac0adc4c0ef2ba3e16d255a4557e71a009c00a5a9cfe441d30749420f44954e982a042f4e79bda

Malware Config

Targets

    • Target

      130d4b6c793fc55eced89a0354e94a57351de4ec3671dd77cfb989de5d1783e8

    • Size

      92KB

    • MD5

      28c1812243aba835ecb3fc2d54aab421

    • SHA1

      43333a4b07bc2cd85464bef8063bcb7d87c998a7

    • SHA256

      130d4b6c793fc55eced89a0354e94a57351de4ec3671dd77cfb989de5d1783e8

    • SHA512

      5a0c1cc0ed8fcb6f5c881affe4c8e99f516094aa3eb3ea8ef6ac0adc4c0ef2ba3e16d255a4557e71a009c00a5a9cfe441d30749420f44954e982a042f4e79bda

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks