General

  • Target

    052d285b43fa67a95e17aa19d0bd9d00eeb36051d7d1298b6d0d1ac49dd05b46

  • Size

    112KB

  • Sample

    220212-m9g6dsdcbq

  • MD5

    3fabeed2ebde29436fe1ec892a6a1cf7

  • SHA1

    8247ede14dd40c44a98a992af13781de61ae380e

  • SHA256

    052d285b43fa67a95e17aa19d0bd9d00eeb36051d7d1298b6d0d1ac49dd05b46

  • SHA512

    ca1095e064c205844dcb26c53dfa8ebe49ae888da9c489f51077145dce8f1e7fce838c8e8798756feb8fa4bef87231e523835c3abc3355ec070d678fadf9ed6e

Malware Config

Targets

    • Target

      052d285b43fa67a95e17aa19d0bd9d00eeb36051d7d1298b6d0d1ac49dd05b46

    • Size

      112KB

    • MD5

      3fabeed2ebde29436fe1ec892a6a1cf7

    • SHA1

      8247ede14dd40c44a98a992af13781de61ae380e

    • SHA256

      052d285b43fa67a95e17aa19d0bd9d00eeb36051d7d1298b6d0d1ac49dd05b46

    • SHA512

      ca1095e064c205844dcb26c53dfa8ebe49ae888da9c489f51077145dce8f1e7fce838c8e8798756feb8fa4bef87231e523835c3abc3355ec070d678fadf9ed6e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks