General

  • Target

    051ce959b53ce35cbdf13681c32d6c3f87664ff98b28284a291eae806d992d68

  • Size

    150KB

  • Sample

    220212-m94z6adccm

  • MD5

    6403ba3b359c5dbebc6b065650c5cf80

  • SHA1

    46fc70a43c5a33350b1f6e4e8e9c6dfa9af937de

  • SHA256

    051ce959b53ce35cbdf13681c32d6c3f87664ff98b28284a291eae806d992d68

  • SHA512

    9a36aa8ef37583c7f0d51f76b5aae87796f0dfb03443a00edaf08fb94fb18ea4037c258b19c71197c1518ec0a167a26d5e56867c0bcdbfb84389b1f62522a0ef

Malware Config

Targets

    • Target

      051ce959b53ce35cbdf13681c32d6c3f87664ff98b28284a291eae806d992d68

    • Size

      150KB

    • MD5

      6403ba3b359c5dbebc6b065650c5cf80

    • SHA1

      46fc70a43c5a33350b1f6e4e8e9c6dfa9af937de

    • SHA256

      051ce959b53ce35cbdf13681c32d6c3f87664ff98b28284a291eae806d992d68

    • SHA512

      9a36aa8ef37583c7f0d51f76b5aae87796f0dfb03443a00edaf08fb94fb18ea4037c258b19c71197c1518ec0a167a26d5e56867c0bcdbfb84389b1f62522a0ef

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks