General

  • Target

    0da4e4b7a26fd2e735c5c43e1a61750476e5b080e3638e9a032ab1ae49122b97

  • Size

    216KB

  • Sample

    220212-h8vymsbafr

  • MD5

    9eb485d339e94fa6b3dadb3045da8cbf

  • SHA1

    9cf338242db94a77a59c30d4b4df91854e34ca2a

  • SHA256

    0da4e4b7a26fd2e735c5c43e1a61750476e5b080e3638e9a032ab1ae49122b97

  • SHA512

    fe733cf57b1d7a982e11d0801e6676304c2e7770686931a93e7fa6abed925ff60c172faf3259fd8dde57417ce9e50ef6caf174774ba7350e996ae28be95f5770

Malware Config

Targets

    • Target

      0da4e4b7a26fd2e735c5c43e1a61750476e5b080e3638e9a032ab1ae49122b97

    • Size

      216KB

    • MD5

      9eb485d339e94fa6b3dadb3045da8cbf

    • SHA1

      9cf338242db94a77a59c30d4b4df91854e34ca2a

    • SHA256

      0da4e4b7a26fd2e735c5c43e1a61750476e5b080e3638e9a032ab1ae49122b97

    • SHA512

      fe733cf57b1d7a982e11d0801e6676304c2e7770686931a93e7fa6abed925ff60c172faf3259fd8dde57417ce9e50ef6caf174774ba7350e996ae28be95f5770

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks