General

  • Target

    12e377bcf7e275ea5b3142eca1284f8a41d4377fa77cbf1902fc8e19cc11af1c

  • Size

    150KB

  • Sample

    220212-f27mraaaeq

  • MD5

    2b10d065123204407e22611ba8310132

  • SHA1

    0cda344d84951c391ff7c758dcf331b3dfc7ca1d

  • SHA256

    12e377bcf7e275ea5b3142eca1284f8a41d4377fa77cbf1902fc8e19cc11af1c

  • SHA512

    b5dcf778b300fc37330aa92c8ad2c80bc9cbd3bb6decb1b67a470f9a421a486be690b3e867dd56beb1ef6128991b9ca9d6b7ec323cdc1743407291d4ab3b6864

Malware Config

Targets

    • Target

      12e377bcf7e275ea5b3142eca1284f8a41d4377fa77cbf1902fc8e19cc11af1c

    • Size

      150KB

    • MD5

      2b10d065123204407e22611ba8310132

    • SHA1

      0cda344d84951c391ff7c758dcf331b3dfc7ca1d

    • SHA256

      12e377bcf7e275ea5b3142eca1284f8a41d4377fa77cbf1902fc8e19cc11af1c

    • SHA512

      b5dcf778b300fc37330aa92c8ad2c80bc9cbd3bb6decb1b67a470f9a421a486be690b3e867dd56beb1ef6128991b9ca9d6b7ec323cdc1743407291d4ab3b6864

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks