General

  • Target

    0fa4a942528fe39e6f1efbb9d83f68e76d4ddc43c53befb352373c4da04d5751

  • Size

    92KB

  • Sample

    220212-hbqyesafgl

  • MD5

    7d0972f705811bcae4a49d09d7f89451

  • SHA1

    081e1798f47a5ec84b4c1c80561eec79fe398143

  • SHA256

    0fa4a942528fe39e6f1efbb9d83f68e76d4ddc43c53befb352373c4da04d5751

  • SHA512

    183d9f67e158749c60c43b62867da38739df0b8b8460602b04c933ad4c55c21932b94e55175a27d2d928b0d284667b6e9811356cf464289ab49bcc700ac0bc55

Malware Config

Targets

    • Target

      0fa4a942528fe39e6f1efbb9d83f68e76d4ddc43c53befb352373c4da04d5751

    • Size

      92KB

    • MD5

      7d0972f705811bcae4a49d09d7f89451

    • SHA1

      081e1798f47a5ec84b4c1c80561eec79fe398143

    • SHA256

      0fa4a942528fe39e6f1efbb9d83f68e76d4ddc43c53befb352373c4da04d5751

    • SHA512

      183d9f67e158749c60c43b62867da38739df0b8b8460602b04c933ad4c55c21932b94e55175a27d2d928b0d284667b6e9811356cf464289ab49bcc700ac0bc55

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks