General

  • Target

    1265f1c2d4a58c9a7b13ad0ce8e55290df12e280e4c34a759963552a44f584b9

  • Size

    216KB

  • Sample

    220212-f8zwgsabcq

  • MD5

    20126b74e9500d502183120593825ae6

  • SHA1

    6f99f782c467f40ae1cc9e4aaed8ba545256a1da

  • SHA256

    1265f1c2d4a58c9a7b13ad0ce8e55290df12e280e4c34a759963552a44f584b9

  • SHA512

    ce066602e400b92c7eeb4953ea6a5b97ec380e7fc5308ce111f6547788e71cbdbc5e0a4ee8c31ccad770af5131b254d02a31617315014558fa0272e057714fac

Malware Config

Targets

    • Target

      1265f1c2d4a58c9a7b13ad0ce8e55290df12e280e4c34a759963552a44f584b9

    • Size

      216KB

    • MD5

      20126b74e9500d502183120593825ae6

    • SHA1

      6f99f782c467f40ae1cc9e4aaed8ba545256a1da

    • SHA256

      1265f1c2d4a58c9a7b13ad0ce8e55290df12e280e4c34a759963552a44f584b9

    • SHA512

      ce066602e400b92c7eeb4953ea6a5b97ec380e7fc5308ce111f6547788e71cbdbc5e0a4ee8c31ccad770af5131b254d02a31617315014558fa0272e057714fac

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks