General

  • Target

    1477dfba495387fba793ca53260285aafeea377caad8de3864225cf3051ad3f8

  • Size

    116KB

  • Sample

    220212-fejmeahfgl

  • MD5

    c1bfeaa5bee4756155b3ea80361b5e64

  • SHA1

    30cf0dc55121516b3a24489cadf152c1f3758e34

  • SHA256

    1477dfba495387fba793ca53260285aafeea377caad8de3864225cf3051ad3f8

  • SHA512

    7cdbe1639e447c62475ea11fc6f771e4d82e21e57314ca3556fe83cc2eb9ea54bfb3093a054ad17dc0a0d8ea00ae4c3aab216e4e6ea8684118ba28a4458667ec

Malware Config

Targets

    • Target

      1477dfba495387fba793ca53260285aafeea377caad8de3864225cf3051ad3f8

    • Size

      116KB

    • MD5

      c1bfeaa5bee4756155b3ea80361b5e64

    • SHA1

      30cf0dc55121516b3a24489cadf152c1f3758e34

    • SHA256

      1477dfba495387fba793ca53260285aafeea377caad8de3864225cf3051ad3f8

    • SHA512

      7cdbe1639e447c62475ea11fc6f771e4d82e21e57314ca3556fe83cc2eb9ea54bfb3093a054ad17dc0a0d8ea00ae4c3aab216e4e6ea8684118ba28a4458667ec

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks