General

  • Target

    12061cae91a6da66e6ed6681bad04850f9dd99265a1f89786aeabed372f2cb11

  • Size

    216KB

  • Sample

    220212-gdbqvaabhp

  • MD5

    043e9bb2de0a8e5874ac8a0be95b3cdb

  • SHA1

    cd4cef589d918afd1f5b1132e335ab3ae0fb6c72

  • SHA256

    12061cae91a6da66e6ed6681bad04850f9dd99265a1f89786aeabed372f2cb11

  • SHA512

    2a3ce77364ee5bfed8f54bc3ce6db58649196b1274b7382aeff0570e94c7de93d409a2f617b096c52f903a4e16b936ff4edbf05613d6f8d5209bd03514eb7148

Malware Config

Targets

    • Target

      12061cae91a6da66e6ed6681bad04850f9dd99265a1f89786aeabed372f2cb11

    • Size

      216KB

    • MD5

      043e9bb2de0a8e5874ac8a0be95b3cdb

    • SHA1

      cd4cef589d918afd1f5b1132e335ab3ae0fb6c72

    • SHA256

      12061cae91a6da66e6ed6681bad04850f9dd99265a1f89786aeabed372f2cb11

    • SHA512

      2a3ce77364ee5bfed8f54bc3ce6db58649196b1274b7382aeff0570e94c7de93d409a2f617b096c52f903a4e16b936ff4edbf05613d6f8d5209bd03514eb7148

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks