General

  • Target

    0dcc90d1fda582d73efa7d404869690a963e83c04d1f5496df9ac44f12fe7987

  • Size

    220KB

  • Sample

    220212-h66x5abael

  • MD5

    168530370de699589b5615f74712cc0e

  • SHA1

    312864c10c5e983fc3c29a9cf8c62fa9830a2527

  • SHA256

    0dcc90d1fda582d73efa7d404869690a963e83c04d1f5496df9ac44f12fe7987

  • SHA512

    e6a125f5768f0dd6169313e04164d63f6e9ade43d36df137be09adaae824cdbdf2cab569bf15992995b5f0c87bb7258d8dbbd2800d835a554fbdf82ca6ba339d

Malware Config

Targets

    • Target

      0dcc90d1fda582d73efa7d404869690a963e83c04d1f5496df9ac44f12fe7987

    • Size

      220KB

    • MD5

      168530370de699589b5615f74712cc0e

    • SHA1

      312864c10c5e983fc3c29a9cf8c62fa9830a2527

    • SHA256

      0dcc90d1fda582d73efa7d404869690a963e83c04d1f5496df9ac44f12fe7987

    • SHA512

      e6a125f5768f0dd6169313e04164d63f6e9ade43d36df137be09adaae824cdbdf2cab569bf15992995b5f0c87bb7258d8dbbd2800d835a554fbdf82ca6ba339d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks