General

  • Target

    0aed49ba83a9a59ff05bdb87baba383583385befb8c052690f263d640c024810

  • Size

    216KB

  • Sample

    220212-ke8nrabgal

  • MD5

    b5954577c3cac5b8e7b53afdbe1a61ac

  • SHA1

    df82dd8a7a3768e0036a78d4ddb4a8cdc20dc3af

  • SHA256

    0aed49ba83a9a59ff05bdb87baba383583385befb8c052690f263d640c024810

  • SHA512

    9e49c1d39d3a2a8bfce36aea285ab209673630a1ea3cb88ceb26fc95ab18427241352311ee8837c984edcb83bcef36b9e4ce2e76e5b869f0bd5af2fa0ae6bdc3

Malware Config

Targets

    • Target

      0aed49ba83a9a59ff05bdb87baba383583385befb8c052690f263d640c024810

    • Size

      216KB

    • MD5

      b5954577c3cac5b8e7b53afdbe1a61ac

    • SHA1

      df82dd8a7a3768e0036a78d4ddb4a8cdc20dc3af

    • SHA256

      0aed49ba83a9a59ff05bdb87baba383583385befb8c052690f263d640c024810

    • SHA512

      9e49c1d39d3a2a8bfce36aea285ab209673630a1ea3cb88ceb26fc95ab18427241352311ee8837c984edcb83bcef36b9e4ce2e76e5b869f0bd5af2fa0ae6bdc3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks