General

  • Target

    0d48f84351580082c7368f5f3f3bffabdac956dcaf6aef14d8d7670d550eafa2

  • Size

    216KB

  • Sample

    220212-jddljsbbcn

  • MD5

    e1391b213f4e85f2438b5fb3dd2f516e

  • SHA1

    170e0787adfbe53acb492576288163a07f787574

  • SHA256

    0d48f84351580082c7368f5f3f3bffabdac956dcaf6aef14d8d7670d550eafa2

  • SHA512

    042b970d99553b65140521759e4e40054d5c171307b604265d0273135f859756f9d447468a0d615082109bd1ca7d9e311b9063502741957c0e2fe9261bd6e924

Malware Config

Targets

    • Target

      0d48f84351580082c7368f5f3f3bffabdac956dcaf6aef14d8d7670d550eafa2

    • Size

      216KB

    • MD5

      e1391b213f4e85f2438b5fb3dd2f516e

    • SHA1

      170e0787adfbe53acb492576288163a07f787574

    • SHA256

      0d48f84351580082c7368f5f3f3bffabdac956dcaf6aef14d8d7670d550eafa2

    • SHA512

      042b970d99553b65140521759e4e40054d5c171307b604265d0273135f859756f9d447468a0d615082109bd1ca7d9e311b9063502741957c0e2fe9261bd6e924

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks