General

  • Target

    05437541f57ae7e66e43951e048b022fe8c137f9691154dabd88daea6583377c

  • Size

    176KB

  • Sample

    220212-m8d3cadcam

  • MD5

    eb66acdf31cbe4a8fec9bccc5d2460f6

  • SHA1

    b9a458625cc811d78b1dfc7e68c04ab0f0c03e6e

  • SHA256

    05437541f57ae7e66e43951e048b022fe8c137f9691154dabd88daea6583377c

  • SHA512

    5f93856e01eb02ef1db48fc77ee57bf97d108d38daf6c8e544750d1657c78e4c1fa332cff7f52df3d2cd7753ef826800b63eaec9156f7b6b08714358251cbaba

Malware Config

Targets

    • Target

      05437541f57ae7e66e43951e048b022fe8c137f9691154dabd88daea6583377c

    • Size

      176KB

    • MD5

      eb66acdf31cbe4a8fec9bccc5d2460f6

    • SHA1

      b9a458625cc811d78b1dfc7e68c04ab0f0c03e6e

    • SHA256

      05437541f57ae7e66e43951e048b022fe8c137f9691154dabd88daea6583377c

    • SHA512

      5f93856e01eb02ef1db48fc77ee57bf97d108d38daf6c8e544750d1657c78e4c1fa332cff7f52df3d2cd7753ef826800b63eaec9156f7b6b08714358251cbaba

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks