General

  • Target

    0ac69bb84a7490395408997e2ca05a1f407153d8c1b304bb2b3dae9716164c20

  • Size

    150KB

  • Sample

    220212-k5gyqacagj

  • MD5

    8e0b27047bf6ba2e5ccf5fae00f08a8b

  • SHA1

    7aa44927ad8dd75ef1eaf281e38b50e6a0789146

  • SHA256

    0ac69bb84a7490395408997e2ca05a1f407153d8c1b304bb2b3dae9716164c20

  • SHA512

    65b5a2adfb55c69751cd4fe8dd273bef4950b1a6ab163693439e84e3447f7198eaa0d86980f2eb6adfea156705937dad801bcafd73464674b300e21a7d354a2d

Malware Config

Targets

    • Target

      0ac69bb84a7490395408997e2ca05a1f407153d8c1b304bb2b3dae9716164c20

    • Size

      150KB

    • MD5

      8e0b27047bf6ba2e5ccf5fae00f08a8b

    • SHA1

      7aa44927ad8dd75ef1eaf281e38b50e6a0789146

    • SHA256

      0ac69bb84a7490395408997e2ca05a1f407153d8c1b304bb2b3dae9716164c20

    • SHA512

      65b5a2adfb55c69751cd4fe8dd273bef4950b1a6ab163693439e84e3447f7198eaa0d86980f2eb6adfea156705937dad801bcafd73464674b300e21a7d354a2d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks