General

  • Target

    0e8ebb0f9d7e63f1f5a4dcc779ead9b30523112b0f875593a862c58f6e2d4272

  • Size

    89KB

  • Sample

    220212-hw2knaahcl

  • MD5

    29f3295ac7308a04aaf9d20631345cd6

  • SHA1

    951abf34a260552b3682f205a01ff294180e4399

  • SHA256

    0e8ebb0f9d7e63f1f5a4dcc779ead9b30523112b0f875593a862c58f6e2d4272

  • SHA512

    b4309b58a0d53dc5b3a183ff3bc7bf76dfbd4ad1187aaa04f846e8f832adb41083899cc248b9da76371896c5a6d5838e2c495464779467ae3e3f4efdb91e92b2

Malware Config

Targets

    • Target

      0e8ebb0f9d7e63f1f5a4dcc779ead9b30523112b0f875593a862c58f6e2d4272

    • Size

      89KB

    • MD5

      29f3295ac7308a04aaf9d20631345cd6

    • SHA1

      951abf34a260552b3682f205a01ff294180e4399

    • SHA256

      0e8ebb0f9d7e63f1f5a4dcc779ead9b30523112b0f875593a862c58f6e2d4272

    • SHA512

      b4309b58a0d53dc5b3a183ff3bc7bf76dfbd4ad1187aaa04f846e8f832adb41083899cc248b9da76371896c5a6d5838e2c495464779467ae3e3f4efdb91e92b2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks