General

  • Target

    06486575c1c6905449157011a92a56332f44abd24d1a1ecf8c0f86114f88cb5d

  • Size

    216KB

  • Sample

    220212-mskvysdabr

  • MD5

    1e50c02f29adf6d9f56efbf169d1b597

  • SHA1

    23f818b81b9a6829959bb2f7a54a42dd85fd5ab3

  • SHA256

    06486575c1c6905449157011a92a56332f44abd24d1a1ecf8c0f86114f88cb5d

  • SHA512

    dea239a77dc8805957c35ddddeda5509d40aefaf3317a7b3d67e774e27de36c576e476066f59159e3cb99c0e53b79a5bf660bd50c7ed9fa49bffc26cabc9af63

Malware Config

Targets

    • Target

      06486575c1c6905449157011a92a56332f44abd24d1a1ecf8c0f86114f88cb5d

    • Size

      216KB

    • MD5

      1e50c02f29adf6d9f56efbf169d1b597

    • SHA1

      23f818b81b9a6829959bb2f7a54a42dd85fd5ab3

    • SHA256

      06486575c1c6905449157011a92a56332f44abd24d1a1ecf8c0f86114f88cb5d

    • SHA512

      dea239a77dc8805957c35ddddeda5509d40aefaf3317a7b3d67e774e27de36c576e476066f59159e3cb99c0e53b79a5bf660bd50c7ed9fa49bffc26cabc9af63

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks