General

  • Target

    0bb1747bb8b3ae57c3d7158eccced68ccd306d65b8073eca5b0a95a536fcac09

  • Size

    216KB

  • Sample

    220212-jzc7xabebj

  • MD5

    cbfe923d42b26516f01e97635ae0c88d

  • SHA1

    328d59e05a3aefaf4bed86c98dff64f396b9cc02

  • SHA256

    0bb1747bb8b3ae57c3d7158eccced68ccd306d65b8073eca5b0a95a536fcac09

  • SHA512

    fb0fbd91b340917bad95bda9462c2fe18cd66685666a86d453ba762d3ea462f67f6bf4e40128b15645aaf192470122fd1235b5c92447dcb45557f2b9abdba4d7

Malware Config

Targets

    • Target

      0bb1747bb8b3ae57c3d7158eccced68ccd306d65b8073eca5b0a95a536fcac09

    • Size

      216KB

    • MD5

      cbfe923d42b26516f01e97635ae0c88d

    • SHA1

      328d59e05a3aefaf4bed86c98dff64f396b9cc02

    • SHA256

      0bb1747bb8b3ae57c3d7158eccced68ccd306d65b8073eca5b0a95a536fcac09

    • SHA512

      fb0fbd91b340917bad95bda9462c2fe18cd66685666a86d453ba762d3ea462f67f6bf4e40128b15645aaf192470122fd1235b5c92447dcb45557f2b9abdba4d7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks