General

  • Target

    0609b8351c67723398dfb7d2802e1987b539c88cb854595a500bd1141e0b1646

  • Size

    150KB

  • Sample

    220212-mwywzsdafn

  • MD5

    61c490e880a1f9158ab9d7e62a49ffa2

  • SHA1

    dcfc54d79fdedcd6b9c62ac532494b8f969e9ec0

  • SHA256

    0609b8351c67723398dfb7d2802e1987b539c88cb854595a500bd1141e0b1646

  • SHA512

    7e42c9d9496d1537217cf2ea223ab0a00bc522e2016e1178210f762fa25fb7a8bd71854029d64bd0b0fe2a408555e35c7252e1c05564417399f61386c0bec220

Malware Config

Targets

    • Target

      0609b8351c67723398dfb7d2802e1987b539c88cb854595a500bd1141e0b1646

    • Size

      150KB

    • MD5

      61c490e880a1f9158ab9d7e62a49ffa2

    • SHA1

      dcfc54d79fdedcd6b9c62ac532494b8f969e9ec0

    • SHA256

      0609b8351c67723398dfb7d2802e1987b539c88cb854595a500bd1141e0b1646

    • SHA512

      7e42c9d9496d1537217cf2ea223ab0a00bc522e2016e1178210f762fa25fb7a8bd71854029d64bd0b0fe2a408555e35c7252e1c05564417399f61386c0bec220

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks