General

  • Target

    0806ad8b8bd82da7d7cedc3c64cb10ce216f4146cc0a741bb0861d66d96a3e83

  • Size

    216KB

  • Sample

    220212-l588mscfbk

  • MD5

    06121d20aedc66fb032ca729016ba83e

  • SHA1

    b0b7643ca3ddd1908e9820518e981a27769e4bd2

  • SHA256

    0806ad8b8bd82da7d7cedc3c64cb10ce216f4146cc0a741bb0861d66d96a3e83

  • SHA512

    5df0c9205a2a4009710d7dfacebd8c5f8301a57263c50d266c8619d668163b63cd7341dbba3336926e730a26099b1221713e6f5934a97a85dcdd58335ba14d95

Malware Config

Targets

    • Target

      0806ad8b8bd82da7d7cedc3c64cb10ce216f4146cc0a741bb0861d66d96a3e83

    • Size

      216KB

    • MD5

      06121d20aedc66fb032ca729016ba83e

    • SHA1

      b0b7643ca3ddd1908e9820518e981a27769e4bd2

    • SHA256

      0806ad8b8bd82da7d7cedc3c64cb10ce216f4146cc0a741bb0861d66d96a3e83

    • SHA512

      5df0c9205a2a4009710d7dfacebd8c5f8301a57263c50d266c8619d668163b63cd7341dbba3336926e730a26099b1221713e6f5934a97a85dcdd58335ba14d95

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks