General

  • Target

    075e4b915c54e3c8173c3b5b29fa19e716ca544ab582941941847d14dba4cc29

  • Size

    216KB

  • Sample

    220212-me9l6acgek

  • MD5

    aced6591646c90b3633121b4d5ce04fc

  • SHA1

    f2858adf9699932eb6ff774d5d58a142abea8778

  • SHA256

    075e4b915c54e3c8173c3b5b29fa19e716ca544ab582941941847d14dba4cc29

  • SHA512

    8d9888c22ac11aa5b26fe823f206c12c7249709f4fa00140dd17adb5faa2809af4ebd1be03e423b790462f01daf5d272ad0a4c31e39eccaf525efbd22d3ed2d7

Malware Config

Targets

    • Target

      075e4b915c54e3c8173c3b5b29fa19e716ca544ab582941941847d14dba4cc29

    • Size

      216KB

    • MD5

      aced6591646c90b3633121b4d5ce04fc

    • SHA1

      f2858adf9699932eb6ff774d5d58a142abea8778

    • SHA256

      075e4b915c54e3c8173c3b5b29fa19e716ca544ab582941941847d14dba4cc29

    • SHA512

      8d9888c22ac11aa5b26fe823f206c12c7249709f4fa00140dd17adb5faa2809af4ebd1be03e423b790462f01daf5d272ad0a4c31e39eccaf525efbd22d3ed2d7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks