General

  • Target

    0cf34fc0ad5156b07b090f34337d01d97dd847c4e8bf15283fdd4d772d61559b

  • Size

    151KB

  • Sample

    220212-jhnmbabbhq

  • MD5

    7b4c4ad800a512eaf3ff6d84b060f819

  • SHA1

    5d154448aba36481e4bd456a22fe14428b461f40

  • SHA256

    0cf34fc0ad5156b07b090f34337d01d97dd847c4e8bf15283fdd4d772d61559b

  • SHA512

    b35632794d47ee222da11357134c78c9caf6995712a2f318a7443a5f4fba8be67b17ac298ac4f5b2c13d687a8ca8e3989aac3d014ad67eea9bb5c96a0791c187

Malware Config

Targets

    • Target

      0cf34fc0ad5156b07b090f34337d01d97dd847c4e8bf15283fdd4d772d61559b

    • Size

      151KB

    • MD5

      7b4c4ad800a512eaf3ff6d84b060f819

    • SHA1

      5d154448aba36481e4bd456a22fe14428b461f40

    • SHA256

      0cf34fc0ad5156b07b090f34337d01d97dd847c4e8bf15283fdd4d772d61559b

    • SHA512

      b35632794d47ee222da11357134c78c9caf6995712a2f318a7443a5f4fba8be67b17ac298ac4f5b2c13d687a8ca8e3989aac3d014ad67eea9bb5c96a0791c187

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks