General

  • Target

    0bb1deb5fc9daeeb7fb30f74e4471d714ca1a157bd2f5e4d24b10d0b1a193cfe

  • Size

    89KB

  • Sample

    220212-jza3jsbear

  • MD5

    8c5b0deaf395bd462494eedc111c735b

  • SHA1

    627cecabcbc8682ffd2d0f38ebaae19c53e5a4b0

  • SHA256

    0bb1deb5fc9daeeb7fb30f74e4471d714ca1a157bd2f5e4d24b10d0b1a193cfe

  • SHA512

    192fd9a1b57492dd43f25d8c91d38b88aa4061b491771fd831a99483bb5a6f25d75c3634025c4e6038303fb96894f90653ec63f0792f7bced6d6f33a737c6e07

Malware Config

Targets

    • Target

      0bb1deb5fc9daeeb7fb30f74e4471d714ca1a157bd2f5e4d24b10d0b1a193cfe

    • Size

      89KB

    • MD5

      8c5b0deaf395bd462494eedc111c735b

    • SHA1

      627cecabcbc8682ffd2d0f38ebaae19c53e5a4b0

    • SHA256

      0bb1deb5fc9daeeb7fb30f74e4471d714ca1a157bd2f5e4d24b10d0b1a193cfe

    • SHA512

      192fd9a1b57492dd43f25d8c91d38b88aa4061b491771fd831a99483bb5a6f25d75c3634025c4e6038303fb96894f90653ec63f0792f7bced6d6f33a737c6e07

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks