General

  • Target

    0d087f53c78c96a352f8e89034a16abb5a7a882a321ef1b2f1e36b6bee47e740

  • Size

    216KB

  • Sample

    220212-jgx5csbbhk

  • MD5

    8a557da3d4ecd9b2f21015d92cb8c785

  • SHA1

    43a5611516f8ee96a04785beaf9cee884e13c740

  • SHA256

    0d087f53c78c96a352f8e89034a16abb5a7a882a321ef1b2f1e36b6bee47e740

  • SHA512

    e1e1b5f36ee960a11f9fcb907538769a27b064fd5bea0e9a034f1b79686016e1ccfa9a8d21985e534ebfd631287c5defa4f3538f7b3968db6b9800669187df6e

Malware Config

Targets

    • Target

      0d087f53c78c96a352f8e89034a16abb5a7a882a321ef1b2f1e36b6bee47e740

    • Size

      216KB

    • MD5

      8a557da3d4ecd9b2f21015d92cb8c785

    • SHA1

      43a5611516f8ee96a04785beaf9cee884e13c740

    • SHA256

      0d087f53c78c96a352f8e89034a16abb5a7a882a321ef1b2f1e36b6bee47e740

    • SHA512

      e1e1b5f36ee960a11f9fcb907538769a27b064fd5bea0e9a034f1b79686016e1ccfa9a8d21985e534ebfd631287c5defa4f3538f7b3968db6b9800669187df6e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks