General

  • Target

    12c4160ae073de5ce11ac2adf9a6c01296f201df9fc3692332165c54b5a7b505

  • Size

    216KB

  • Sample

    220212-f4s75saagm

  • MD5

    224c327f4730c4ba85ce9712cf1dbb75

  • SHA1

    dfe5b0969e1fe08353fcbc3f0bbcdc9dbf2e56ab

  • SHA256

    12c4160ae073de5ce11ac2adf9a6c01296f201df9fc3692332165c54b5a7b505

  • SHA512

    c8bf76e6ee970f4af4070f98fde9acfbee723e3b222a233ef0c48e76420f130a663d0db274c1d859919a66f4095777b6d8393655d3671309c2a92202c77adb81

Malware Config

Targets

    • Target

      12c4160ae073de5ce11ac2adf9a6c01296f201df9fc3692332165c54b5a7b505

    • Size

      216KB

    • MD5

      224c327f4730c4ba85ce9712cf1dbb75

    • SHA1

      dfe5b0969e1fe08353fcbc3f0bbcdc9dbf2e56ab

    • SHA256

      12c4160ae073de5ce11ac2adf9a6c01296f201df9fc3692332165c54b5a7b505

    • SHA512

      c8bf76e6ee970f4af4070f98fde9acfbee723e3b222a233ef0c48e76420f130a663d0db274c1d859919a66f4095777b6d8393655d3671309c2a92202c77adb81

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks