General

  • Target

    0c8345323dfe305c0a71dab3e1ccddc71fa33958fd06871e33414b57a74219b3

  • Size

    89KB

  • Sample

    220212-jp8k3abdap

  • MD5

    71760d1f83b33dd1a29cd02998adb40b

  • SHA1

    5c6b0b4a142e6a5262ab7609ba6f91ae377c6df5

  • SHA256

    0c8345323dfe305c0a71dab3e1ccddc71fa33958fd06871e33414b57a74219b3

  • SHA512

    a8b6b95b49e78a7056ccd41e230a7a7c4462a0fe8ebe1a64b765cf7a39c437f171f1a70d0f8f49e811f5001bb3ab371192daed3f45f5b26c32c8008839102c71

Malware Config

Targets

    • Target

      0c8345323dfe305c0a71dab3e1ccddc71fa33958fd06871e33414b57a74219b3

    • Size

      89KB

    • MD5

      71760d1f83b33dd1a29cd02998adb40b

    • SHA1

      5c6b0b4a142e6a5262ab7609ba6f91ae377c6df5

    • SHA256

      0c8345323dfe305c0a71dab3e1ccddc71fa33958fd06871e33414b57a74219b3

    • SHA512

      a8b6b95b49e78a7056ccd41e230a7a7c4462a0fe8ebe1a64b765cf7a39c437f171f1a70d0f8f49e811f5001bb3ab371192daed3f45f5b26c32c8008839102c71

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks