General

  • Target

    1075f7658932802758d935dc3eb0f1c9cb279f1c87272ec3371ce75352e8aa89

  • Size

    216KB

  • Sample

    220212-g1lvbsaecr

  • MD5

    5b557f7cfeaa4ba523f9230eb744cfed

  • SHA1

    7f9bb36366c8be4b742475b922ac6308fcee5979

  • SHA256

    1075f7658932802758d935dc3eb0f1c9cb279f1c87272ec3371ce75352e8aa89

  • SHA512

    2b21cfbbea3c73f618b160564496b7c9a6111c13a201703c8424440f718c7b4233bd0b87968a3bdf00b3d35f47b5b2952d8654ce5ca8fb2a5aabb73f8eea3850

Malware Config

Targets

    • Target

      1075f7658932802758d935dc3eb0f1c9cb279f1c87272ec3371ce75352e8aa89

    • Size

      216KB

    • MD5

      5b557f7cfeaa4ba523f9230eb744cfed

    • SHA1

      7f9bb36366c8be4b742475b922ac6308fcee5979

    • SHA256

      1075f7658932802758d935dc3eb0f1c9cb279f1c87272ec3371ce75352e8aa89

    • SHA512

      2b21cfbbea3c73f618b160564496b7c9a6111c13a201703c8424440f718c7b4233bd0b87968a3bdf00b3d35f47b5b2952d8654ce5ca8fb2a5aabb73f8eea3850

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks