General

  • Target

    0bf7cd663f84a5aa4427d4f2ade69e232cacf42899fb5eaf97e7a2d87afb8ea2

  • Size

    92KB

  • Sample

    220212-jwdn9sbdgn

  • MD5

    6b127101c948ed99ccbeb9110397bc07

  • SHA1

    af43d12c13f6942f67f6dc01f253429c3afc17d4

  • SHA256

    0bf7cd663f84a5aa4427d4f2ade69e232cacf42899fb5eaf97e7a2d87afb8ea2

  • SHA512

    d958f3bdd50b4a25e27e68a2506b493667b6e7b55a13c1c2af73d12d43a33f2b3f8133bc33e2b83284506da661339b761fa1023a3c808082023f5f8e70616236

Malware Config

Targets

    • Target

      0bf7cd663f84a5aa4427d4f2ade69e232cacf42899fb5eaf97e7a2d87afb8ea2

    • Size

      92KB

    • MD5

      6b127101c948ed99ccbeb9110397bc07

    • SHA1

      af43d12c13f6942f67f6dc01f253429c3afc17d4

    • SHA256

      0bf7cd663f84a5aa4427d4f2ade69e232cacf42899fb5eaf97e7a2d87afb8ea2

    • SHA512

      d958f3bdd50b4a25e27e68a2506b493667b6e7b55a13c1c2af73d12d43a33f2b3f8133bc33e2b83284506da661339b761fa1023a3c808082023f5f8e70616236

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks