General

  • Target

    06b75933ba2a3486e1dd238b766169d62c6efd2a44a11c1c2b2d9dbc76246238

  • Size

    150KB

  • Sample

    220212-mnlaxschfn

  • MD5

    111128cb498401b2ff56065fdfee330d

  • SHA1

    c5b973ea247b4025273a7b8248855f022092dc62

  • SHA256

    06b75933ba2a3486e1dd238b766169d62c6efd2a44a11c1c2b2d9dbc76246238

  • SHA512

    d8ffc1b5e5abf199bd767d5e57f0e7f1c3b75c519333fe216bad366b0ca179e603c24005e3ab02973632c917f78c1aa1232f44676854cd31e63a8532ab2a2549

Malware Config

Targets

    • Target

      06b75933ba2a3486e1dd238b766169d62c6efd2a44a11c1c2b2d9dbc76246238

    • Size

      150KB

    • MD5

      111128cb498401b2ff56065fdfee330d

    • SHA1

      c5b973ea247b4025273a7b8248855f022092dc62

    • SHA256

      06b75933ba2a3486e1dd238b766169d62c6efd2a44a11c1c2b2d9dbc76246238

    • SHA512

      d8ffc1b5e5abf199bd767d5e57f0e7f1c3b75c519333fe216bad366b0ca179e603c24005e3ab02973632c917f78c1aa1232f44676854cd31e63a8532ab2a2549

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks