General

  • Target

    0deab96db6530d4d605b0d4318106967324de3450beeb7c09d9e5d034d504eb4

  • Size

    216KB

  • Sample

    220212-h5betsback

  • MD5

    80e0a178f41bd4f10a73bd8cc1c04e71

  • SHA1

    0567a05721a6f5ccdac538834039ff539ea748ce

  • SHA256

    0deab96db6530d4d605b0d4318106967324de3450beeb7c09d9e5d034d504eb4

  • SHA512

    7ddeb5d28602be90d8c997b04f573e1141dec916c0b947ab9de63222e317d49dd71b911bbc6930ca1bfa07c219bc25d1ff3518ef78369dac96453c84be4e5a11

Malware Config

Targets

    • Target

      0deab96db6530d4d605b0d4318106967324de3450beeb7c09d9e5d034d504eb4

    • Size

      216KB

    • MD5

      80e0a178f41bd4f10a73bd8cc1c04e71

    • SHA1

      0567a05721a6f5ccdac538834039ff539ea748ce

    • SHA256

      0deab96db6530d4d605b0d4318106967324de3450beeb7c09d9e5d034d504eb4

    • SHA512

      7ddeb5d28602be90d8c997b04f573e1141dec916c0b947ab9de63222e317d49dd71b911bbc6930ca1bfa07c219bc25d1ff3518ef78369dac96453c84be4e5a11

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks