General

  • Target

    0fe5e131ff70372928988fb8603d89dcdaadb547bf745ef6bf42f5f2553c452f

  • Size

    92KB

  • Sample

    220212-g8nc5aafcl

  • MD5

    d4dd197dfd33ed094851675efba387bd

  • SHA1

    5fe95cef1771e63466a9fd20f37d284fdbaa6368

  • SHA256

    0fe5e131ff70372928988fb8603d89dcdaadb547bf745ef6bf42f5f2553c452f

  • SHA512

    0f2821853eac801870d7672acf24a6a77440a292bbf5ecd011b77b2c39c9bee50cec9dc3737115740b242367a25addeca2e9c345099952cf28c54de1ea1c36fe

Malware Config

Targets

    • Target

      0fe5e131ff70372928988fb8603d89dcdaadb547bf745ef6bf42f5f2553c452f

    • Size

      92KB

    • MD5

      d4dd197dfd33ed094851675efba387bd

    • SHA1

      5fe95cef1771e63466a9fd20f37d284fdbaa6368

    • SHA256

      0fe5e131ff70372928988fb8603d89dcdaadb547bf745ef6bf42f5f2553c452f

    • SHA512

      0f2821853eac801870d7672acf24a6a77440a292bbf5ecd011b77b2c39c9bee50cec9dc3737115740b242367a25addeca2e9c345099952cf28c54de1ea1c36fe

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks