General

  • Target

    06712a90a4e62d7c8693d3fafed09f9997c2c3fdf2a33f2604d26052eceeb451

  • Size

    176KB

  • Sample

    220212-mq2exsdaan

  • MD5

    6cd11c2b9d2c16bb55f05c0697131866

  • SHA1

    a2f3e11e2eb87cf5de48f889b92bb2baf9bcaf09

  • SHA256

    06712a90a4e62d7c8693d3fafed09f9997c2c3fdf2a33f2604d26052eceeb451

  • SHA512

    a7d13dcaa8796e3779b0735d90922bbabf17d146baeeb8c379e3183dc4159e955d28da48eceb9f3cfc6782d3225595e4a0a8d064121554c04d43feb11640bb63

Malware Config

Targets

    • Target

      06712a90a4e62d7c8693d3fafed09f9997c2c3fdf2a33f2604d26052eceeb451

    • Size

      176KB

    • MD5

      6cd11c2b9d2c16bb55f05c0697131866

    • SHA1

      a2f3e11e2eb87cf5de48f889b92bb2baf9bcaf09

    • SHA256

      06712a90a4e62d7c8693d3fafed09f9997c2c3fdf2a33f2604d26052eceeb451

    • SHA512

      a7d13dcaa8796e3779b0735d90922bbabf17d146baeeb8c379e3183dc4159e955d28da48eceb9f3cfc6782d3225595e4a0a8d064121554c04d43feb11640bb63

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks