General

  • Target

    0c8be62cb3d97eaa0eff72b8811a349ee46a9069eeeb699f44c78db9d19b5974

  • Size

    92KB

  • Sample

    220212-jplfjabchn

  • MD5

    ba2ea182d3c65c3bad8a2e19f7555016

  • SHA1

    aaca4f45518daeb6ea5e0e26f1a45e8bb16347ca

  • SHA256

    0c8be62cb3d97eaa0eff72b8811a349ee46a9069eeeb699f44c78db9d19b5974

  • SHA512

    89ddfada28dd9f2ae604a21752a5d9fd00adea0c8414c833b23b8bff481ed0587f80964dfdd14786a76ec6d7c06fca1f701b87840131c2a5df74e200c68f6d3e

Malware Config

Targets

    • Target

      0c8be62cb3d97eaa0eff72b8811a349ee46a9069eeeb699f44c78db9d19b5974

    • Size

      92KB

    • MD5

      ba2ea182d3c65c3bad8a2e19f7555016

    • SHA1

      aaca4f45518daeb6ea5e0e26f1a45e8bb16347ca

    • SHA256

      0c8be62cb3d97eaa0eff72b8811a349ee46a9069eeeb699f44c78db9d19b5974

    • SHA512

      89ddfada28dd9f2ae604a21752a5d9fd00adea0c8414c833b23b8bff481ed0587f80964dfdd14786a76ec6d7c06fca1f701b87840131c2a5df74e200c68f6d3e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks