General

  • Target

    0c86ee36c9eeb493e69106d185f72195777f4f439bc6f2a57fa065a16cf6ed0e

  • Size

    216KB

  • Sample

    220212-jpzm6abdak

  • MD5

    2685bdaa57134131434aa4c74cbeeb50

  • SHA1

    99bc537aba805b7fa64c48bbc968671222e14c8d

  • SHA256

    0c86ee36c9eeb493e69106d185f72195777f4f439bc6f2a57fa065a16cf6ed0e

  • SHA512

    6adee0a0688291b8008efe0065d43c405a4c3afa548f789de904911f321fc79dd025f817dc6ecd65ea7665a484f85d92d26cad14996be857c508c25665dd1e6e

Malware Config

Targets

    • Target

      0c86ee36c9eeb493e69106d185f72195777f4f439bc6f2a57fa065a16cf6ed0e

    • Size

      216KB

    • MD5

      2685bdaa57134131434aa4c74cbeeb50

    • SHA1

      99bc537aba805b7fa64c48bbc968671222e14c8d

    • SHA256

      0c86ee36c9eeb493e69106d185f72195777f4f439bc6f2a57fa065a16cf6ed0e

    • SHA512

      6adee0a0688291b8008efe0065d43c405a4c3afa548f789de904911f321fc79dd025f817dc6ecd65ea7665a484f85d92d26cad14996be857c508c25665dd1e6e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks