General

  • Target

    0b48382cbd5d36a385a1a5d62023e44f11b79c8b3b1dd0242bfca46bcbb845f7

  • Size

    216KB

  • Sample

    220212-j7261abfap

  • MD5

    a749645ce30b2b681d1fac81b7f16dbd

  • SHA1

    f5187f225189894a3b566a59a26fa2e63d359353

  • SHA256

    0b48382cbd5d36a385a1a5d62023e44f11b79c8b3b1dd0242bfca46bcbb845f7

  • SHA512

    af6a01c35a41750d9f7c5c54235025ff978d9c7b5e44d6e791a537d069f7328a20cbbb484aefd62d0acfff6a7e4f7a4ad673a69ea4aa05bbf565a0394bbe6195

Malware Config

Targets

    • Target

      0b48382cbd5d36a385a1a5d62023e44f11b79c8b3b1dd0242bfca46bcbb845f7

    • Size

      216KB

    • MD5

      a749645ce30b2b681d1fac81b7f16dbd

    • SHA1

      f5187f225189894a3b566a59a26fa2e63d359353

    • SHA256

      0b48382cbd5d36a385a1a5d62023e44f11b79c8b3b1dd0242bfca46bcbb845f7

    • SHA512

      af6a01c35a41750d9f7c5c54235025ff978d9c7b5e44d6e791a537d069f7328a20cbbb484aefd62d0acfff6a7e4f7a4ad673a69ea4aa05bbf565a0394bbe6195

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks