General

  • Target

    08015c32df87da503cd4da056aadedf29dd120d88245611a0736b17fc397c63f

  • Size

    150KB

  • Sample

    220212-l6l5hacfbp

  • MD5

    4e43dc8b7feb736d8c00346f5c8eadd2

  • SHA1

    8ea68ccff7d8025d6af750746d9e91dea884e6e5

  • SHA256

    08015c32df87da503cd4da056aadedf29dd120d88245611a0736b17fc397c63f

  • SHA512

    a8a2598ef09ae65b120dc91466e0fb9879566705bd7d56d63c7fefa024f554df8d2d7a11863a1c7e5e5507cf1d07d49d5366a7cb69e4398188c8e2c45fa3b773

Malware Config

Targets

    • Target

      08015c32df87da503cd4da056aadedf29dd120d88245611a0736b17fc397c63f

    • Size

      150KB

    • MD5

      4e43dc8b7feb736d8c00346f5c8eadd2

    • SHA1

      8ea68ccff7d8025d6af750746d9e91dea884e6e5

    • SHA256

      08015c32df87da503cd4da056aadedf29dd120d88245611a0736b17fc397c63f

    • SHA512

      a8a2598ef09ae65b120dc91466e0fb9879566705bd7d56d63c7fefa024f554df8d2d7a11863a1c7e5e5507cf1d07d49d5366a7cb69e4398188c8e2c45fa3b773

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks