General

  • Target

    06d8debe16fc71068376712f131f4143fff3af5d3f80404d367eb73973409645

  • Size

    176KB

  • Sample

    220212-mk8l2schdm

  • MD5

    f006f3ad6bca17cfb10a95274b22d2bf

  • SHA1

    271d01bc08296835d52c465fa14c46901e3acd56

  • SHA256

    06d8debe16fc71068376712f131f4143fff3af5d3f80404d367eb73973409645

  • SHA512

    bab8aec34b16771e5a552524651044804e8976678761e31fbc95cc3ea40964d6faf7bab2b6c34b393b6ab52e143072649bad4953f4609eadfeac8f23be723e9a

Malware Config

Targets

    • Target

      06d8debe16fc71068376712f131f4143fff3af5d3f80404d367eb73973409645

    • Size

      176KB

    • MD5

      f006f3ad6bca17cfb10a95274b22d2bf

    • SHA1

      271d01bc08296835d52c465fa14c46901e3acd56

    • SHA256

      06d8debe16fc71068376712f131f4143fff3af5d3f80404d367eb73973409645

    • SHA512

      bab8aec34b16771e5a552524651044804e8976678761e31fbc95cc3ea40964d6faf7bab2b6c34b393b6ab52e143072649bad4953f4609eadfeac8f23be723e9a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks