General

  • Target

    10a98f2fd742279119cb0d704e0a26844e411d445bf66ff3c55bb9191cf60d12

  • Size

    216KB

  • Sample

    220212-gxgq7saeak

  • MD5

    e11264f5ed87975189d7098aec995298

  • SHA1

    111fb2f93c086e4cf2e87d3283e7900b28248466

  • SHA256

    10a98f2fd742279119cb0d704e0a26844e411d445bf66ff3c55bb9191cf60d12

  • SHA512

    464b3437d0a2e727c9f02624686bda8fc54a636af54b5e2fdb8bcd6b6668c8031c6e374c646a3966accf1befe1fbb5c297e8e0fd02d32a043ba0bab5da366f87

Malware Config

Targets

    • Target

      10a98f2fd742279119cb0d704e0a26844e411d445bf66ff3c55bb9191cf60d12

    • Size

      216KB

    • MD5

      e11264f5ed87975189d7098aec995298

    • SHA1

      111fb2f93c086e4cf2e87d3283e7900b28248466

    • SHA256

      10a98f2fd742279119cb0d704e0a26844e411d445bf66ff3c55bb9191cf60d12

    • SHA512

      464b3437d0a2e727c9f02624686bda8fc54a636af54b5e2fdb8bcd6b6668c8031c6e374c646a3966accf1befe1fbb5c297e8e0fd02d32a043ba0bab5da366f87

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks