General

  • Target

    060326aec18f158619212b766da47e6d9e31c9ad5b67b973a9d72397efe2e5ac

  • Size

    150KB

  • Sample

    220212-mxm6wadafr

  • MD5

    f90d3efa5e2d613c7f70fc0d11b34922

  • SHA1

    ae870155cc590d983a11a88fe8d2757fb6d93e4b

  • SHA256

    060326aec18f158619212b766da47e6d9e31c9ad5b67b973a9d72397efe2e5ac

  • SHA512

    3c4cdbe7a6b0f4e2f8bc2de2ee4a994370d7f2d9d4ef347f7faa7119b100bd3d0cf2bc09e1ee7486e9e9f6079daad603839d64a5ce1c6703d4d9be246b25a07d

Malware Config

Targets

    • Target

      060326aec18f158619212b766da47e6d9e31c9ad5b67b973a9d72397efe2e5ac

    • Size

      150KB

    • MD5

      f90d3efa5e2d613c7f70fc0d11b34922

    • SHA1

      ae870155cc590d983a11a88fe8d2757fb6d93e4b

    • SHA256

      060326aec18f158619212b766da47e6d9e31c9ad5b67b973a9d72397efe2e5ac

    • SHA512

      3c4cdbe7a6b0f4e2f8bc2de2ee4a994370d7f2d9d4ef347f7faa7119b100bd3d0cf2bc09e1ee7486e9e9f6079daad603839d64a5ce1c6703d4d9be246b25a07d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks