General

  • Target

    0f825f6727e3a0ff478530a9d3476a04f8b63d422a42806803fe3189318199d9

  • Size

    88KB

  • Sample

    220212-hdd2msafhq

  • MD5

    d4a669c7424339d7d30b0deb1402921c

  • SHA1

    200c813c8dc964ec77328f394ced3b2c932d6c28

  • SHA256

    0f825f6727e3a0ff478530a9d3476a04f8b63d422a42806803fe3189318199d9

  • SHA512

    5cf0615303ee2ef3bbdc5bdfb99f8a8e1c063f0d7c772a700d80ab312b00eb31308785fe3f6a3ea312d61974e332e2e1c295424ce831e96f74f1b41ebdfc8436

Malware Config

Targets

    • Target

      0f825f6727e3a0ff478530a9d3476a04f8b63d422a42806803fe3189318199d9

    • Size

      88KB

    • MD5

      d4a669c7424339d7d30b0deb1402921c

    • SHA1

      200c813c8dc964ec77328f394ced3b2c932d6c28

    • SHA256

      0f825f6727e3a0ff478530a9d3476a04f8b63d422a42806803fe3189318199d9

    • SHA512

      5cf0615303ee2ef3bbdc5bdfb99f8a8e1c063f0d7c772a700d80ab312b00eb31308785fe3f6a3ea312d61974e332e2e1c295424ce831e96f74f1b41ebdfc8436

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks