General

  • Target

    10f92fc82c4e205ae9a07b49793825556e82a131e1e0b8f55fa9e66f061f5b8f

  • Size

    92KB

  • Sample

    220212-gsnzqaaden

  • MD5

    19b96b1f196c372be09c209cf92d6ec8

  • SHA1

    813f23b80e8b04d60f3c762f6fdafc0cdf6b4b86

  • SHA256

    10f92fc82c4e205ae9a07b49793825556e82a131e1e0b8f55fa9e66f061f5b8f

  • SHA512

    02643f120608c0b33c7d875cb7aaa3d00ade547d6286e09f9c78f125167f0c2d23881ecbb0a4889f4c841febe6e387202eceb445fd3fd8b832353e477ceba5f9

Malware Config

Targets

    • Target

      10f92fc82c4e205ae9a07b49793825556e82a131e1e0b8f55fa9e66f061f5b8f

    • Size

      92KB

    • MD5

      19b96b1f196c372be09c209cf92d6ec8

    • SHA1

      813f23b80e8b04d60f3c762f6fdafc0cdf6b4b86

    • SHA256

      10f92fc82c4e205ae9a07b49793825556e82a131e1e0b8f55fa9e66f061f5b8f

    • SHA512

      02643f120608c0b33c7d875cb7aaa3d00ade547d6286e09f9c78f125167f0c2d23881ecbb0a4889f4c841febe6e387202eceb445fd3fd8b832353e477ceba5f9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks