General

  • Target

    0b892e38f1b1289d5e82c631ea715ad6cf7b5206adfe4df8ce24b9ab9980f592

  • Size

    216KB

  • Sample

    220212-j26x1abeel

  • MD5

    9570fa2497a4949c11280c54bf79b083

  • SHA1

    fb1f3dbb191ceb0c9abd4ad15f89b25bbebd60a1

  • SHA256

    0b892e38f1b1289d5e82c631ea715ad6cf7b5206adfe4df8ce24b9ab9980f592

  • SHA512

    0776e62e43ea44db062f57127854d2a4fe4f9ce152a0ef4b1488a0431ae6261e3292b609ecaca86ba56b859c8b1ac3e1a476e5bba0eee235625649a67458001f

Malware Config

Targets

    • Target

      0b892e38f1b1289d5e82c631ea715ad6cf7b5206adfe4df8ce24b9ab9980f592

    • Size

      216KB

    • MD5

      9570fa2497a4949c11280c54bf79b083

    • SHA1

      fb1f3dbb191ceb0c9abd4ad15f89b25bbebd60a1

    • SHA256

      0b892e38f1b1289d5e82c631ea715ad6cf7b5206adfe4df8ce24b9ab9980f592

    • SHA512

      0776e62e43ea44db062f57127854d2a4fe4f9ce152a0ef4b1488a0431ae6261e3292b609ecaca86ba56b859c8b1ac3e1a476e5bba0eee235625649a67458001f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks