General

  • Target

    0c6a24a642dc9d23e0a2412f47f74206fb8a2af542e63f9c5b5413329b54a8ba

  • Size

    216KB

  • Sample

    220212-jrbn4sbdcj

  • MD5

    895306e70c5fbf2be7e9402b5753d0e1

  • SHA1

    0c1ab4649ad8a696a31b64683debd94401406855

  • SHA256

    0c6a24a642dc9d23e0a2412f47f74206fb8a2af542e63f9c5b5413329b54a8ba

  • SHA512

    93b38fe2923e38a5efdf246eb1da3fa7b087b7cb90cead569fc542bbb8280940367bbcb5f49fcbc4a621ba66e36a768d669a6f2e91145292d4dce6116f2b2673

Malware Config

Targets

    • Target

      0c6a24a642dc9d23e0a2412f47f74206fb8a2af542e63f9c5b5413329b54a8ba

    • Size

      216KB

    • MD5

      895306e70c5fbf2be7e9402b5753d0e1

    • SHA1

      0c1ab4649ad8a696a31b64683debd94401406855

    • SHA256

      0c6a24a642dc9d23e0a2412f47f74206fb8a2af542e63f9c5b5413329b54a8ba

    • SHA512

      93b38fe2923e38a5efdf246eb1da3fa7b087b7cb90cead569fc542bbb8280940367bbcb5f49fcbc4a621ba66e36a768d669a6f2e91145292d4dce6116f2b2673

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks