General

  • Target

    080755748000bfe47588a9c55c1478a3c9a80c053f3efd172375b8126c001b3f

  • Size

    92KB

  • Sample

    220212-l564aacfbj

  • MD5

    e24f977a8e02e52a3f93d53549da5f76

  • SHA1

    1b278e2b4d30fe4499c31dc248eadba678f166b9

  • SHA256

    080755748000bfe47588a9c55c1478a3c9a80c053f3efd172375b8126c001b3f

  • SHA512

    a8fc880efbfef5bc91d3426ceaa08ced37d0f74329be6c7866d0a5fef5fcf0e0e76ad43e77e3ded4685e1fe77d4193dad000600c365e6dfc242dde1b29436844

Malware Config

Targets

    • Target

      080755748000bfe47588a9c55c1478a3c9a80c053f3efd172375b8126c001b3f

    • Size

      92KB

    • MD5

      e24f977a8e02e52a3f93d53549da5f76

    • SHA1

      1b278e2b4d30fe4499c31dc248eadba678f166b9

    • SHA256

      080755748000bfe47588a9c55c1478a3c9a80c053f3efd172375b8126c001b3f

    • SHA512

      a8fc880efbfef5bc91d3426ceaa08ced37d0f74329be6c7866d0a5fef5fcf0e0e76ad43e77e3ded4685e1fe77d4193dad000600c365e6dfc242dde1b29436844

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks