General

  • Target

    0e3809c74a58f955dddace7c724c94f0e1e572f319fc002333f26ad29a3cfb27

  • Size

    216KB

  • Sample

    220212-h1kgyaahhj

  • MD5

    2fe39cd9f42e48b6c2b672b01dd46036

  • SHA1

    6e8f14b2c097ddb7dfd3509dd181f24cea1fa169

  • SHA256

    0e3809c74a58f955dddace7c724c94f0e1e572f319fc002333f26ad29a3cfb27

  • SHA512

    b5b40d0961ef451b7644c24c88a3cdec2e5b98e20b16be518794c0aa62131516f3463b35b50f8d6dac4090bfea0d5bef84229e3ef067d1fd9d4377b763c72339

Malware Config

Targets

    • Target

      0e3809c74a58f955dddace7c724c94f0e1e572f319fc002333f26ad29a3cfb27

    • Size

      216KB

    • MD5

      2fe39cd9f42e48b6c2b672b01dd46036

    • SHA1

      6e8f14b2c097ddb7dfd3509dd181f24cea1fa169

    • SHA256

      0e3809c74a58f955dddace7c724c94f0e1e572f319fc002333f26ad29a3cfb27

    • SHA512

      b5b40d0961ef451b7644c24c88a3cdec2e5b98e20b16be518794c0aa62131516f3463b35b50f8d6dac4090bfea0d5bef84229e3ef067d1fd9d4377b763c72339

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks