General

  • Target

    0c83b2aa15b81a73766ad855a5c04743a74d63d111eecb550574d9c4179207e2

  • Size

    176KB

  • Sample

    220212-jp6rgabdan

  • MD5

    b5dbca09222098d677818de073e2d1df

  • SHA1

    647758fc8f538100fc7520bc50bd29790006e07e

  • SHA256

    0c83b2aa15b81a73766ad855a5c04743a74d63d111eecb550574d9c4179207e2

  • SHA512

    5eec1854a772639449e85ef950108bdedbdb6f0adb565525ac7cc5012e7c3d2ffce1e62e581269b902742f75319fcf4abdef7a8090688e0425a6ad6aadd3e5cf

Malware Config

Targets

    • Target

      0c83b2aa15b81a73766ad855a5c04743a74d63d111eecb550574d9c4179207e2

    • Size

      176KB

    • MD5

      b5dbca09222098d677818de073e2d1df

    • SHA1

      647758fc8f538100fc7520bc50bd29790006e07e

    • SHA256

      0c83b2aa15b81a73766ad855a5c04743a74d63d111eecb550574d9c4179207e2

    • SHA512

      5eec1854a772639449e85ef950108bdedbdb6f0adb565525ac7cc5012e7c3d2ffce1e62e581269b902742f75319fcf4abdef7a8090688e0425a6ad6aadd3e5cf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks