General

  • Target

    094d1574ef4fbc3413a208423379d81ae01d6da810f62e9542bb6e8f03534431

  • Size

    92KB

  • Sample

    220212-lnj77acchq

  • MD5

    b0a3d84bfae71166457e296a35c324e3

  • SHA1

    4c3c5fab4d0312501bdff3d02d2884de20b56d42

  • SHA256

    094d1574ef4fbc3413a208423379d81ae01d6da810f62e9542bb6e8f03534431

  • SHA512

    32af0d6ace7ed80c37af3699d90977a8f108c5158130e481ce4e92f85d45ce34c96a3d1e7bfe3eee28e88c067a3d6e15c349ca26c9a85a94cf0e414e317c3812

Malware Config

Targets

    • Target

      094d1574ef4fbc3413a208423379d81ae01d6da810f62e9542bb6e8f03534431

    • Size

      92KB

    • MD5

      b0a3d84bfae71166457e296a35c324e3

    • SHA1

      4c3c5fab4d0312501bdff3d02d2884de20b56d42

    • SHA256

      094d1574ef4fbc3413a208423379d81ae01d6da810f62e9542bb6e8f03534431

    • SHA512

      32af0d6ace7ed80c37af3699d90977a8f108c5158130e481ce4e92f85d45ce34c96a3d1e7bfe3eee28e88c067a3d6e15c349ca26c9a85a94cf0e414e317c3812

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks