General

  • Target

    0b0e71435370c904fa47a24bead262da237f192c6367d109f00a5b9b327f7246

  • Size

    150KB

  • Sample

    220212-kblptabfel

  • MD5

    e3e6e46a02c1974edb556b34e7094781

  • SHA1

    2bd389ceca5c3594760f5e9dd97244d28c3ec522

  • SHA256

    0b0e71435370c904fa47a24bead262da237f192c6367d109f00a5b9b327f7246

  • SHA512

    57585da3e9de1844d2eb6fe24f2912089863f1cbf9f3ca831d3ae32074dba187f4f5530980e5fa7c3d883c1fe680431f228d03a30e815f7a9a7cfd584df9b21d

Malware Config

Targets

    • Target

      0b0e71435370c904fa47a24bead262da237f192c6367d109f00a5b9b327f7246

    • Size

      150KB

    • MD5

      e3e6e46a02c1974edb556b34e7094781

    • SHA1

      2bd389ceca5c3594760f5e9dd97244d28c3ec522

    • SHA256

      0b0e71435370c904fa47a24bead262da237f192c6367d109f00a5b9b327f7246

    • SHA512

      57585da3e9de1844d2eb6fe24f2912089863f1cbf9f3ca831d3ae32074dba187f4f5530980e5fa7c3d883c1fe680431f228d03a30e815f7a9a7cfd584df9b21d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks