General

  • Target

    0bd47cea24a60db576b324ece6e4baef8c01472181a181f33ec656bd2feb04a6

  • Size

    92KB

  • Sample

    220212-jxwlgabdhn

  • MD5

    61a0cfed1f2549c5b6c576ef55de8a9d

  • SHA1

    0ab339f87fd74425a60839170d20d6221cef5291

  • SHA256

    0bd47cea24a60db576b324ece6e4baef8c01472181a181f33ec656bd2feb04a6

  • SHA512

    e4da601af1d0558acfc90c617f2db57c9cfccc12f371b12f571cfbed7e972fdccfd3c4d21dd2fa251f3696045c9068da28ea09b2fe1769e8b7af993d87f6e4ae

Malware Config

Targets

    • Target

      0bd47cea24a60db576b324ece6e4baef8c01472181a181f33ec656bd2feb04a6

    • Size

      92KB

    • MD5

      61a0cfed1f2549c5b6c576ef55de8a9d

    • SHA1

      0ab339f87fd74425a60839170d20d6221cef5291

    • SHA256

      0bd47cea24a60db576b324ece6e4baef8c01472181a181f33ec656bd2feb04a6

    • SHA512

      e4da601af1d0558acfc90c617f2db57c9cfccc12f371b12f571cfbed7e972fdccfd3c4d21dd2fa251f3696045c9068da28ea09b2fe1769e8b7af993d87f6e4ae

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks