General

  • Target

    0d4ec3252d9957d176de1876abbb4415ca65324e73b46d632aff375fc0a5b617

  • Size

    176KB

  • Sample

    220212-jc4rcabbck

  • MD5

    0dc9db379ac71b75d7b2c8cab60bc422

  • SHA1

    a297a2222d648e025c698ea6aed5294010414360

  • SHA256

    0d4ec3252d9957d176de1876abbb4415ca65324e73b46d632aff375fc0a5b617

  • SHA512

    f20e0017ab95da12ddb24637ef82a83a62886138eb64e3482ea8ca03e59fa2d139b7df50cc9308295c3df218ad0d95752a80cd575edf2c971c69fd0c7dad2641

Malware Config

Targets

    • Target

      0d4ec3252d9957d176de1876abbb4415ca65324e73b46d632aff375fc0a5b617

    • Size

      176KB

    • MD5

      0dc9db379ac71b75d7b2c8cab60bc422

    • SHA1

      a297a2222d648e025c698ea6aed5294010414360

    • SHA256

      0d4ec3252d9957d176de1876abbb4415ca65324e73b46d632aff375fc0a5b617

    • SHA512

      f20e0017ab95da12ddb24637ef82a83a62886138eb64e3482ea8ca03e59fa2d139b7df50cc9308295c3df218ad0d95752a80cd575edf2c971c69fd0c7dad2641

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks