General

  • Target

    10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4

  • Size

    216KB

  • Sample

    220212-gwwtqsadhp

  • MD5

    22a8f741f2e94c89d3d95fd05fc1dfba

  • SHA1

    6c50604a4e989d4cb41a32e1518568bcba1ee4e2

  • SHA256

    10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4

  • SHA512

    0c20891241dd2bdda591abf7bf2935616bd6be45c72cd9f653a26ae8c16738e884ac096e86a43926a4b749a9b29a5e9922f5e039be1d8480f2dd6f2266634698

Malware Config

Targets

    • Target

      10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4

    • Size

      216KB

    • MD5

      22a8f741f2e94c89d3d95fd05fc1dfba

    • SHA1

      6c50604a4e989d4cb41a32e1518568bcba1ee4e2

    • SHA256

      10b2bf6aa046146845d968f2350af50215a109034b79deb1375385d69f0b8ab4

    • SHA512

      0c20891241dd2bdda591abf7bf2935616bd6be45c72cd9f653a26ae8c16738e884ac096e86a43926a4b749a9b29a5e9922f5e039be1d8480f2dd6f2266634698

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks