General

  • Target

    0cec0e79d882e3e93758159d6b0a1ae688b749ce478ff6f6d18ac5944baed1ef

  • Size

    150KB

  • Sample

    220212-jh4zasbcam

  • MD5

    fea275660cec720f66cce951c9fbe1f0

  • SHA1

    5ddbb10f01f47c06fdc31b7c4c36c7ef954e2d86

  • SHA256

    0cec0e79d882e3e93758159d6b0a1ae688b749ce478ff6f6d18ac5944baed1ef

  • SHA512

    8371b7fd5ac62038ad780f59cda9b7ca9c793e269748aa1faf40cb0e8588334ecb503d646200f46a87e4a3cefde973d137f5fb679a2136e88b24532391b863b9

Malware Config

Targets

    • Target

      0cec0e79d882e3e93758159d6b0a1ae688b749ce478ff6f6d18ac5944baed1ef

    • Size

      150KB

    • MD5

      fea275660cec720f66cce951c9fbe1f0

    • SHA1

      5ddbb10f01f47c06fdc31b7c4c36c7ef954e2d86

    • SHA256

      0cec0e79d882e3e93758159d6b0a1ae688b749ce478ff6f6d18ac5944baed1ef

    • SHA512

      8371b7fd5ac62038ad780f59cda9b7ca9c793e269748aa1faf40cb0e8588334ecb503d646200f46a87e4a3cefde973d137f5fb679a2136e88b24532391b863b9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks