General

  • Target

    0d3a3993ee1f618c5851e8e3869081efd95334c795417dbaa0f14bade2ac76e5

  • Size

    92KB

  • Sample

    220212-jecewabbej

  • MD5

    66c8c66d083ccc40531ee5a05648916a

  • SHA1

    89d4bb2b656b4f8e9dfaaadbae527848b7d0088f

  • SHA256

    0d3a3993ee1f618c5851e8e3869081efd95334c795417dbaa0f14bade2ac76e5

  • SHA512

    73f2f95d4cbe43724f751091856dd0109ca2f18e5999de23cba0847bd28e2885a8eacd826e2f0a25f15fa02da53ad6638900cd79a15f36eff00f92b2a4fe1c88

Malware Config

Targets

    • Target

      0d3a3993ee1f618c5851e8e3869081efd95334c795417dbaa0f14bade2ac76e5

    • Size

      92KB

    • MD5

      66c8c66d083ccc40531ee5a05648916a

    • SHA1

      89d4bb2b656b4f8e9dfaaadbae527848b7d0088f

    • SHA256

      0d3a3993ee1f618c5851e8e3869081efd95334c795417dbaa0f14bade2ac76e5

    • SHA512

      73f2f95d4cbe43724f751091856dd0109ca2f18e5999de23cba0847bd28e2885a8eacd826e2f0a25f15fa02da53ad6638900cd79a15f36eff00f92b2a4fe1c88

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks