General

  • Target

    10cf5cc4281516a173c86f9a5a5a0264187ed03e1bc11d3ac79ed51080963508

  • Size

    152KB

  • Sample

    220212-gvpc9sadgk

  • MD5

    285278ee7cc585a79a7ddd263939548e

  • SHA1

    0e19e7d299f3e8f5b1be877cb724762a87c99480

  • SHA256

    10cf5cc4281516a173c86f9a5a5a0264187ed03e1bc11d3ac79ed51080963508

  • SHA512

    a52c784b8c516a722ea393749f325c0f4b96a9089c433fedd007242e8f8aaf8338740db3baeae5edbc7f07c960c49d78f7eac12e4894ddacb19d848fb76d10b3

Malware Config

Targets

    • Target

      10cf5cc4281516a173c86f9a5a5a0264187ed03e1bc11d3ac79ed51080963508

    • Size

      152KB

    • MD5

      285278ee7cc585a79a7ddd263939548e

    • SHA1

      0e19e7d299f3e8f5b1be877cb724762a87c99480

    • SHA256

      10cf5cc4281516a173c86f9a5a5a0264187ed03e1bc11d3ac79ed51080963508

    • SHA512

      a52c784b8c516a722ea393749f325c0f4b96a9089c433fedd007242e8f8aaf8338740db3baeae5edbc7f07c960c49d78f7eac12e4894ddacb19d848fb76d10b3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks