General

  • Target

    098561539b7df5a907949dd164a91f65a0e28f2427d7adc3abf8bc33a6a3f815

  • Size

    150KB

  • Sample

    220212-lkw3ksccfk

  • MD5

    9a537a8cbcf56a02d87d806f05bfa0cc

  • SHA1

    7800b21364bc51debf4b476a0a173385a96026a7

  • SHA256

    098561539b7df5a907949dd164a91f65a0e28f2427d7adc3abf8bc33a6a3f815

  • SHA512

    e962d7081bdc713e05fe375cc4ffa9978b5955ae612896689f2970d7add69ef559957ed6497671e5779438cf32547b0f5b923c8d0749f03c9116b60a65b452d3

Malware Config

Targets

    • Target

      098561539b7df5a907949dd164a91f65a0e28f2427d7adc3abf8bc33a6a3f815

    • Size

      150KB

    • MD5

      9a537a8cbcf56a02d87d806f05bfa0cc

    • SHA1

      7800b21364bc51debf4b476a0a173385a96026a7

    • SHA256

      098561539b7df5a907949dd164a91f65a0e28f2427d7adc3abf8bc33a6a3f815

    • SHA512

      e962d7081bdc713e05fe375cc4ffa9978b5955ae612896689f2970d7add69ef559957ed6497671e5779438cf32547b0f5b923c8d0749f03c9116b60a65b452d3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks