General

  • Target

    03250c6e2a25f0dd2dafb53bb2b6cf18f642facd8d473f8051d36cbdd52f7ba0

  • Size

    89KB

  • Sample

    220212-n2gqbsdffq

  • MD5

    a13d82346b62c2e30b75ac59784d510f

  • SHA1

    c78e12532bb7fdad7f6f4a609fa88c67b96689cd

  • SHA256

    03250c6e2a25f0dd2dafb53bb2b6cf18f642facd8d473f8051d36cbdd52f7ba0

  • SHA512

    d7d748339e52e54facbefb72c0c41f960c71934e326edce292472a6aac0e249ec94f7f1b517f9cfd76ff3531a00429f975b6cb51f999c4fb6d96cdfac2e649f4

Malware Config

Targets

    • Target

      03250c6e2a25f0dd2dafb53bb2b6cf18f642facd8d473f8051d36cbdd52f7ba0

    • Size

      89KB

    • MD5

      a13d82346b62c2e30b75ac59784d510f

    • SHA1

      c78e12532bb7fdad7f6f4a609fa88c67b96689cd

    • SHA256

      03250c6e2a25f0dd2dafb53bb2b6cf18f642facd8d473f8051d36cbdd52f7ba0

    • SHA512

      d7d748339e52e54facbefb72c0c41f960c71934e326edce292472a6aac0e249ec94f7f1b517f9cfd76ff3531a00429f975b6cb51f999c4fb6d96cdfac2e649f4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks