General

  • Target

    103eede7d55650429c82dc2164b4506fff72554a91610155b9840b54f3f1544e

  • Size

    150KB

  • Sample

    220212-g4bhrsaefl

  • MD5

    258be498df76a8a9ee6e3ab283622ecf

  • SHA1

    b90d29738d9f9e62a9505cc57996fe9bedfa98b0

  • SHA256

    103eede7d55650429c82dc2164b4506fff72554a91610155b9840b54f3f1544e

  • SHA512

    b764565725db1c120ebbb2186a6c0bf6024b8781e7cef93d3189a8078790d2f12267fbc47bfd9739caf409cdd0b7664023af7bead97dbdecb3939cec923b7fa8

Malware Config

Targets

    • Target

      103eede7d55650429c82dc2164b4506fff72554a91610155b9840b54f3f1544e

    • Size

      150KB

    • MD5

      258be498df76a8a9ee6e3ab283622ecf

    • SHA1

      b90d29738d9f9e62a9505cc57996fe9bedfa98b0

    • SHA256

      103eede7d55650429c82dc2164b4506fff72554a91610155b9840b54f3f1544e

    • SHA512

      b764565725db1c120ebbb2186a6c0bf6024b8781e7cef93d3189a8078790d2f12267fbc47bfd9739caf409cdd0b7664023af7bead97dbdecb3939cec923b7fa8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks