General

  • Target

    1143cf737f5f325e4bdc9c1adfa4d8d259931050046e5da772e65fd97772c1be

  • Size

    188KB

  • Sample

    220212-gnd9qaachr

  • MD5

    6b0398395e1b06438e72a5ee9bec96da

  • SHA1

    5ed76d0cd15dcbdf2fa7e8b31c59e0bdec67c7fc

  • SHA256

    1143cf737f5f325e4bdc9c1adfa4d8d259931050046e5da772e65fd97772c1be

  • SHA512

    fe607428548921eccc6f2e9a71d6aa0176f7f907bc4679a30dc18208b7a7e229d9d04cda8f9d748135e4a7512d2d3d0aa8880c97e4b1b837776f2eb8c2b26176

Malware Config

Targets

    • Target

      1143cf737f5f325e4bdc9c1adfa4d8d259931050046e5da772e65fd97772c1be

    • Size

      188KB

    • MD5

      6b0398395e1b06438e72a5ee9bec96da

    • SHA1

      5ed76d0cd15dcbdf2fa7e8b31c59e0bdec67c7fc

    • SHA256

      1143cf737f5f325e4bdc9c1adfa4d8d259931050046e5da772e65fd97772c1be

    • SHA512

      fe607428548921eccc6f2e9a71d6aa0176f7f907bc4679a30dc18208b7a7e229d9d04cda8f9d748135e4a7512d2d3d0aa8880c97e4b1b837776f2eb8c2b26176

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks