General

  • Target

    115611c076d4c4a3010e5004d63315c618a3f7ee265ac627ff0361ad9f5c1e90

  • Size

    176KB

  • Sample

    220212-gmb3zaacgr

  • MD5

    e1307c67b4293f9fce6c6b44abd23097

  • SHA1

    8e303991efcd373d9fcf7f7a6f237c15e83afde5

  • SHA256

    115611c076d4c4a3010e5004d63315c618a3f7ee265ac627ff0361ad9f5c1e90

  • SHA512

    34484b4e3d5142e9cc85101d1e182223a9b8b36d4d37ea2537f0176c1e4f337f61d4de8f0c9d060951c2c9a410a2c4469e9f5929ed4955a5bab6ea61cfc8b21e

Malware Config

Targets

    • Target

      115611c076d4c4a3010e5004d63315c618a3f7ee265ac627ff0361ad9f5c1e90

    • Size

      176KB

    • MD5

      e1307c67b4293f9fce6c6b44abd23097

    • SHA1

      8e303991efcd373d9fcf7f7a6f237c15e83afde5

    • SHA256

      115611c076d4c4a3010e5004d63315c618a3f7ee265ac627ff0361ad9f5c1e90

    • SHA512

      34484b4e3d5142e9cc85101d1e182223a9b8b36d4d37ea2537f0176c1e4f337f61d4de8f0c9d060951c2c9a410a2c4469e9f5929ed4955a5bab6ea61cfc8b21e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks