General

  • Target

    0acd1d97d931094ce293226bce76d9619642767f5208c52c3e081db4ee004908

  • Size

    150KB

  • Sample

    220212-k45y6acafm

  • MD5

    f12f2e48af062b47d49deb3d86443513

  • SHA1

    ced2ab55a8ef953f6f0b44b8ffddedda033eaf97

  • SHA256

    0acd1d97d931094ce293226bce76d9619642767f5208c52c3e081db4ee004908

  • SHA512

    40f55d5d9e992a687d14ae6b94f4e464f94bec3fb2d0412a78af57213a47fad91494c0536978f96a492006524334da6190a261e76a8bf3666332403d5f4636b0

Malware Config

Targets

    • Target

      0acd1d97d931094ce293226bce76d9619642767f5208c52c3e081db4ee004908

    • Size

      150KB

    • MD5

      f12f2e48af062b47d49deb3d86443513

    • SHA1

      ced2ab55a8ef953f6f0b44b8ffddedda033eaf97

    • SHA256

      0acd1d97d931094ce293226bce76d9619642767f5208c52c3e081db4ee004908

    • SHA512

      40f55d5d9e992a687d14ae6b94f4e464f94bec3fb2d0412a78af57213a47fad91494c0536978f96a492006524334da6190a261e76a8bf3666332403d5f4636b0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks