General

  • Target

    052119185c3d4e25b3ad31c55797f87c177dfe360275543e7ff91907d05e4910

  • Size

    92KB

  • Sample

    220212-m9z17sdccl

  • MD5

    de4cb1b248a589557d75b7779269bfd2

  • SHA1

    bfbe2afd3944191e24ee3bbb8cbec8bf375849e1

  • SHA256

    052119185c3d4e25b3ad31c55797f87c177dfe360275543e7ff91907d05e4910

  • SHA512

    b5a189d02f14f6f525b443cd665c4cc72f5e27c38df88e71dfe98349c4e332d60135e47ff854c0d0a2104b0046aa1370cacc6431c1e5b2234cfe9a02c1d552f1

Malware Config

Targets

    • Target

      052119185c3d4e25b3ad31c55797f87c177dfe360275543e7ff91907d05e4910

    • Size

      92KB

    • MD5

      de4cb1b248a589557d75b7779269bfd2

    • SHA1

      bfbe2afd3944191e24ee3bbb8cbec8bf375849e1

    • SHA256

      052119185c3d4e25b3ad31c55797f87c177dfe360275543e7ff91907d05e4910

    • SHA512

      b5a189d02f14f6f525b443cd665c4cc72f5e27c38df88e71dfe98349c4e332d60135e47ff854c0d0a2104b0046aa1370cacc6431c1e5b2234cfe9a02c1d552f1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks