General

  • Target

    03201d71f368b6b08b07b811ef877d62b28bb962e28788068017f8289aa47681

  • Size

    152KB

  • Sample

    220212-n2ynvadfgl

  • MD5

    e451b73b7efb0a1a3a731fd0ff05e471

  • SHA1

    9d689ce2b8cc14850adfab9f147f0d7cc5b2e6da

  • SHA256

    03201d71f368b6b08b07b811ef877d62b28bb962e28788068017f8289aa47681

  • SHA512

    9d5c28d2d5ee5a7d86e1b871b64810ab7d55adc82c8f10df28e962089452a8165e5dea97f63d7dffea4f6a57cf5fbc3ce2c8bb8898dfad739d4d030cad4d60c1

Malware Config

Targets

    • Target

      03201d71f368b6b08b07b811ef877d62b28bb962e28788068017f8289aa47681

    • Size

      152KB

    • MD5

      e451b73b7efb0a1a3a731fd0ff05e471

    • SHA1

      9d689ce2b8cc14850adfab9f147f0d7cc5b2e6da

    • SHA256

      03201d71f368b6b08b07b811ef877d62b28bb962e28788068017f8289aa47681

    • SHA512

      9d5c28d2d5ee5a7d86e1b871b64810ab7d55adc82c8f10df28e962089452a8165e5dea97f63d7dffea4f6a57cf5fbc3ce2c8bb8898dfad739d4d030cad4d60c1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks