General

  • Target

    0f11e970227e94e33065ea395f5811e42d2f9a1220967c27b2555b48787ce7e4

  • Size

    216KB

  • Sample

    220212-hhr43aagek

  • MD5

    0a2b1551c9ef3c0a6e8ea7026ae560e0

  • SHA1

    d55cecf86992c243d8bcedc27a832ed9bb5f869f

  • SHA256

    0f11e970227e94e33065ea395f5811e42d2f9a1220967c27b2555b48787ce7e4

  • SHA512

    fa0dbe3fc55b3b59bf29b8aba630fb349740edad0590a3e5ffc05e15b08de72b18243ba79e849d645371be60f75625c07883ec2f9e28b848386cef515ec433f7

Malware Config

Targets

    • Target

      0f11e970227e94e33065ea395f5811e42d2f9a1220967c27b2555b48787ce7e4

    • Size

      216KB

    • MD5

      0a2b1551c9ef3c0a6e8ea7026ae560e0

    • SHA1

      d55cecf86992c243d8bcedc27a832ed9bb5f869f

    • SHA256

      0f11e970227e94e33065ea395f5811e42d2f9a1220967c27b2555b48787ce7e4

    • SHA512

      fa0dbe3fc55b3b59bf29b8aba630fb349740edad0590a3e5ffc05e15b08de72b18243ba79e849d645371be60f75625c07883ec2f9e28b848386cef515ec433f7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks