General

  • Target

    0c49764e31da8ca95f9d7e1af91b86f59303ebbcc0e38b41cd90073ac0b1971c

  • Size

    176KB

  • Sample

    220212-jr4d5abdcq

  • MD5

    236463c6b44dae64de40acae6139ff1b

  • SHA1

    51faf7605c44f850cce440fa360b0c963ca04e4a

  • SHA256

    0c49764e31da8ca95f9d7e1af91b86f59303ebbcc0e38b41cd90073ac0b1971c

  • SHA512

    ce0d99e826ac82c2e6031cd8d26faff5b592a24340663534c48eef1ce903f70b1c412b6738f23a9feae68c06727abf67544baef24aa5c869917ce7733d1b1489

Malware Config

Targets

    • Target

      0c49764e31da8ca95f9d7e1af91b86f59303ebbcc0e38b41cd90073ac0b1971c

    • Size

      176KB

    • MD5

      236463c6b44dae64de40acae6139ff1b

    • SHA1

      51faf7605c44f850cce440fa360b0c963ca04e4a

    • SHA256

      0c49764e31da8ca95f9d7e1af91b86f59303ebbcc0e38b41cd90073ac0b1971c

    • SHA512

      ce0d99e826ac82c2e6031cd8d26faff5b592a24340663534c48eef1ce903f70b1c412b6738f23a9feae68c06727abf67544baef24aa5c869917ce7733d1b1489

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks