General

  • Target

    0f1adcc8a84c28177f4a27bcc58448d5288a98bfef2202c9b57592e802d17d95

  • Size

    150KB

  • Sample

    220212-hhkpzsagdr

  • MD5

    4b4c77aa80c63933f0efa7da06af1227

  • SHA1

    3f3ebf459a4664ed98c83142f05563fd226ff792

  • SHA256

    0f1adcc8a84c28177f4a27bcc58448d5288a98bfef2202c9b57592e802d17d95

  • SHA512

    4d0e65aa43a306e86b8e378e5af1c74bd9458adf3dd6fbcbc330349578b89e69ed9d3c27c1fae39023b7bf874e8d45559dc8b44b69fc309c5838dc465affcb31

Malware Config

Targets

    • Target

      0f1adcc8a84c28177f4a27bcc58448d5288a98bfef2202c9b57592e802d17d95

    • Size

      150KB

    • MD5

      4b4c77aa80c63933f0efa7da06af1227

    • SHA1

      3f3ebf459a4664ed98c83142f05563fd226ff792

    • SHA256

      0f1adcc8a84c28177f4a27bcc58448d5288a98bfef2202c9b57592e802d17d95

    • SHA512

      4d0e65aa43a306e86b8e378e5af1c74bd9458adf3dd6fbcbc330349578b89e69ed9d3c27c1fae39023b7bf874e8d45559dc8b44b69fc309c5838dc465affcb31

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks