General

  • Target

    0ba3cbdaa35132b275368375c8a1e915853e57b4a4a36e58c5f0edb1038b01be

  • Size

    176KB

  • Sample

    220212-j1d6labecj

  • MD5

    a315ae6557cdeaf61a9431f8abf663e4

  • SHA1

    6094ea8a39ec4269da303a68a009ddb49214ecff

  • SHA256

    0ba3cbdaa35132b275368375c8a1e915853e57b4a4a36e58c5f0edb1038b01be

  • SHA512

    a490430fc2bfba21802c46a8e4c06d2bdf42297890f8a6bd5ee61d042644044b1b0b227934cbcc17d86bd3aef4f49dc22fc6f715d34d0f81694eba0477fb3e82

Malware Config

Targets

    • Target

      0ba3cbdaa35132b275368375c8a1e915853e57b4a4a36e58c5f0edb1038b01be

    • Size

      176KB

    • MD5

      a315ae6557cdeaf61a9431f8abf663e4

    • SHA1

      6094ea8a39ec4269da303a68a009ddb49214ecff

    • SHA256

      0ba3cbdaa35132b275368375c8a1e915853e57b4a4a36e58c5f0edb1038b01be

    • SHA512

      a490430fc2bfba21802c46a8e4c06d2bdf42297890f8a6bd5ee61d042644044b1b0b227934cbcc17d86bd3aef4f49dc22fc6f715d34d0f81694eba0477fb3e82

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks