General

  • Target

    0578aded6b549aff597036154eac27e3dc5409b2fa885e23984e77cbc2a01ed1

  • Size

    216KB

  • Sample

    220212-m475madbfk

  • MD5

    ab82e84388b0519bfcf3d8e0131800f5

  • SHA1

    adbe818edfd7c68f20dbc1ff153e8e405feb2c8f

  • SHA256

    0578aded6b549aff597036154eac27e3dc5409b2fa885e23984e77cbc2a01ed1

  • SHA512

    44f9d9b66cb3e8e92c8d155decafe587469028daef3e9df0ae4a91f64a05ca46ddfcefee29a4f24f337308269717c14ad7ad4af28163d8edc9c187a2e3c6abdd

Malware Config

Targets

    • Target

      0578aded6b549aff597036154eac27e3dc5409b2fa885e23984e77cbc2a01ed1

    • Size

      216KB

    • MD5

      ab82e84388b0519bfcf3d8e0131800f5

    • SHA1

      adbe818edfd7c68f20dbc1ff153e8e405feb2c8f

    • SHA256

      0578aded6b549aff597036154eac27e3dc5409b2fa885e23984e77cbc2a01ed1

    • SHA512

      44f9d9b66cb3e8e92c8d155decafe587469028daef3e9df0ae4a91f64a05ca46ddfcefee29a4f24f337308269717c14ad7ad4af28163d8edc9c187a2e3c6abdd

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks