General

  • Target

    0b8d680ea3b2c0ab38d22220fff42fe58b8a6db3a64176ec10626281dcafa143

  • Size

    92KB

  • Sample

    220212-j2rhbabedq

  • MD5

    74f04b0cf135a77879483d2da60a9e66

  • SHA1

    f3fde8eb1a7ed55770aca98d46d3a167ff488118

  • SHA256

    0b8d680ea3b2c0ab38d22220fff42fe58b8a6db3a64176ec10626281dcafa143

  • SHA512

    87e2bfbfe295e8f51e5deb440074891b7385887db2d3e03f2e320aae0a63c614a18ced585f7ed127c60de47afb0cafb3d4fdbc3d8024072e8a3acdffd0c80b53

Malware Config

Targets

    • Target

      0b8d680ea3b2c0ab38d22220fff42fe58b8a6db3a64176ec10626281dcafa143

    • Size

      92KB

    • MD5

      74f04b0cf135a77879483d2da60a9e66

    • SHA1

      f3fde8eb1a7ed55770aca98d46d3a167ff488118

    • SHA256

      0b8d680ea3b2c0ab38d22220fff42fe58b8a6db3a64176ec10626281dcafa143

    • SHA512

      87e2bfbfe295e8f51e5deb440074891b7385887db2d3e03f2e320aae0a63c614a18ced585f7ed127c60de47afb0cafb3d4fdbc3d8024072e8a3acdffd0c80b53

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks