General

  • Target

    0f1034c593e725dfe5a968d0fdecf2cdd141b6bfd658c4e6b524f14a2ff6f5af

  • Size

    216KB

  • Sample

    220212-hhxdsaagem

  • MD5

    8fd1a05274ceb5ff2350e8ecb15a2e52

  • SHA1

    f5ccb96df914caaf640aadcc78090db2e87c344f

  • SHA256

    0f1034c593e725dfe5a968d0fdecf2cdd141b6bfd658c4e6b524f14a2ff6f5af

  • SHA512

    bf192af6d0ede66e2d18cabea06b03fbf603df1852dcceb58ba5c4e89a4564357a1aae8b23f14dade1ae83c9a7143d52727efd39c6d9045b1c4ae6691a5c4071

Malware Config

Targets

    • Target

      0f1034c593e725dfe5a968d0fdecf2cdd141b6bfd658c4e6b524f14a2ff6f5af

    • Size

      216KB

    • MD5

      8fd1a05274ceb5ff2350e8ecb15a2e52

    • SHA1

      f5ccb96df914caaf640aadcc78090db2e87c344f

    • SHA256

      0f1034c593e725dfe5a968d0fdecf2cdd141b6bfd658c4e6b524f14a2ff6f5af

    • SHA512

      bf192af6d0ede66e2d18cabea06b03fbf603df1852dcceb58ba5c4e89a4564357a1aae8b23f14dade1ae83c9a7143d52727efd39c6d9045b1c4ae6691a5c4071

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks