General

  • Target

    088a10397d2feff339693167002501e5ceae71de684b3bb29f1921cd86d44c9d

  • Size

    92KB

  • Sample

    220212-ly5lwacecp

  • MD5

    d0808d302fb0b6ca663538c41050377c

  • SHA1

    ab59bccc0dc075d9368fbc432dda6a3570d05985

  • SHA256

    088a10397d2feff339693167002501e5ceae71de684b3bb29f1921cd86d44c9d

  • SHA512

    c50464ddc53a014cd0ba2bc5a85711fc742cd24d09a106e576c4d6113c3b87a9334f3511792df56b249d713090efa47628e6abb14fcfcd6bc504711e131c3c97

Malware Config

Targets

    • Target

      088a10397d2feff339693167002501e5ceae71de684b3bb29f1921cd86d44c9d

    • Size

      92KB

    • MD5

      d0808d302fb0b6ca663538c41050377c

    • SHA1

      ab59bccc0dc075d9368fbc432dda6a3570d05985

    • SHA256

      088a10397d2feff339693167002501e5ceae71de684b3bb29f1921cd86d44c9d

    • SHA512

      c50464ddc53a014cd0ba2bc5a85711fc742cd24d09a106e576c4d6113c3b87a9334f3511792df56b249d713090efa47628e6abb14fcfcd6bc504711e131c3c97

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks