General

  • Target

    1306f8c075e647f4a1c1082a80e75721c643702f7fdd370597f653ebe303f6dd

  • Size

    89KB

  • Sample

    220212-f1j53aaadj

  • MD5

    731a0f955309fd751325a86384b9f1bb

  • SHA1

    b8fba604539fbd02d089f1c5c6232b5f0f802245

  • SHA256

    1306f8c075e647f4a1c1082a80e75721c643702f7fdd370597f653ebe303f6dd

  • SHA512

    a7d7df199172f4cb33e5149e03754719655a03069ce5f47bfc90edaa35416255282b68d5f0f8cb93c2d89c83abca70b6cbfdfe94424247451f1cf1b19c05355e

Malware Config

Targets

    • Target

      1306f8c075e647f4a1c1082a80e75721c643702f7fdd370597f653ebe303f6dd

    • Size

      89KB

    • MD5

      731a0f955309fd751325a86384b9f1bb

    • SHA1

      b8fba604539fbd02d089f1c5c6232b5f0f802245

    • SHA256

      1306f8c075e647f4a1c1082a80e75721c643702f7fdd370597f653ebe303f6dd

    • SHA512

      a7d7df199172f4cb33e5149e03754719655a03069ce5f47bfc90edaa35416255282b68d5f0f8cb93c2d89c83abca70b6cbfdfe94424247451f1cf1b19c05355e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks