General

  • Target

    0b3f986af972826dae148bef5bab014045e3befd85d4e55667996384d70f795f

  • Size

    216KB

  • Sample

    220212-j9cdcsbfbp

  • MD5

    a6ca73aecd63da58015f6d0a886fe4ad

  • SHA1

    2b5f2b8039700cfef989b5a245d5695419af09dc

  • SHA256

    0b3f986af972826dae148bef5bab014045e3befd85d4e55667996384d70f795f

  • SHA512

    f104add0c0dc45d4b9a25fc7a1140472772918ad3137dfe5a5afdd928e1e25d4f521df41a1d5ee752a4b2274ac9e32286f01bdfd0e9733543e5bc27ba1da07b1

Malware Config

Targets

    • Target

      0b3f986af972826dae148bef5bab014045e3befd85d4e55667996384d70f795f

    • Size

      216KB

    • MD5

      a6ca73aecd63da58015f6d0a886fe4ad

    • SHA1

      2b5f2b8039700cfef989b5a245d5695419af09dc

    • SHA256

      0b3f986af972826dae148bef5bab014045e3befd85d4e55667996384d70f795f

    • SHA512

      f104add0c0dc45d4b9a25fc7a1140472772918ad3137dfe5a5afdd928e1e25d4f521df41a1d5ee752a4b2274ac9e32286f01bdfd0e9733543e5bc27ba1da07b1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks