General

  • Target

    05515a727b4081778be62772566aa41d95b66822a05c8367f3a9a0b16686bc9f

  • Size

    150KB

  • Sample

    220212-m7pgpadbhq

  • MD5

    9acab2d262159c11d858ee3bd42ba26d

  • SHA1

    a7bc5ce5b6e124b763a6e692bb6d38aecffa10ef

  • SHA256

    05515a727b4081778be62772566aa41d95b66822a05c8367f3a9a0b16686bc9f

  • SHA512

    094751da6a28970e4407a32cacf0f5571f7b1c80d2d279b99ff63db0e90afcf6881020b56239b6096a17dcdc9b384a587fa5ea87d934f5c92ad9f91b278876fb

Malware Config

Targets

    • Target

      05515a727b4081778be62772566aa41d95b66822a05c8367f3a9a0b16686bc9f

    • Size

      150KB

    • MD5

      9acab2d262159c11d858ee3bd42ba26d

    • SHA1

      a7bc5ce5b6e124b763a6e692bb6d38aecffa10ef

    • SHA256

      05515a727b4081778be62772566aa41d95b66822a05c8367f3a9a0b16686bc9f

    • SHA512

      094751da6a28970e4407a32cacf0f5571f7b1c80d2d279b99ff63db0e90afcf6881020b56239b6096a17dcdc9b384a587fa5ea87d934f5c92ad9f91b278876fb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks