General

  • Target

    0b5cd16a1796a456f435bfe524bb4769d683068e2ae0ceb2ab31fb148a17e556

  • Size

    216KB

  • Sample

    220212-j6nbfsbehl

  • MD5

    092deb5167ab589000bf2428ffdc4e0e

  • SHA1

    5f635d549155a3de1761482d11c964ab4386a1ba

  • SHA256

    0b5cd16a1796a456f435bfe524bb4769d683068e2ae0ceb2ab31fb148a17e556

  • SHA512

    23df54662107fa9e2a72c72fe0e1fc2ce6c653f047f6ff3598a076faf5e008957c8b4b057556a57b7a6b4b5e4963af5d2d09193e111257e1d428d8fd43bce9e2

Malware Config

Targets

    • Target

      0b5cd16a1796a456f435bfe524bb4769d683068e2ae0ceb2ab31fb148a17e556

    • Size

      216KB

    • MD5

      092deb5167ab589000bf2428ffdc4e0e

    • SHA1

      5f635d549155a3de1761482d11c964ab4386a1ba

    • SHA256

      0b5cd16a1796a456f435bfe524bb4769d683068e2ae0ceb2ab31fb148a17e556

    • SHA512

      23df54662107fa9e2a72c72fe0e1fc2ce6c653f047f6ff3598a076faf5e008957c8b4b057556a57b7a6b4b5e4963af5d2d09193e111257e1d428d8fd43bce9e2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks