General

  • Target

    02dd3daf2836a524ebd20d794f02292f29d1e97aacfa957a487226a2a804d5d7

  • Size

    150KB

  • Sample

    220212-n449eadfhr

  • MD5

    1fb2fb6675c57bd3018eb2146cf2325f

  • SHA1

    3fb36483e6d84705ad2d8a04b2da1ed9ea9206af

  • SHA256

    02dd3daf2836a524ebd20d794f02292f29d1e97aacfa957a487226a2a804d5d7

  • SHA512

    9c6f8d66a88aa1f50c0b88dbfbe945bc1163055d44d2b9b8f978691a0411f60272f01414854e202bf2897b099bc6874843814ab60d323956ee5a47d62620cf5a

Malware Config

Targets

    • Target

      02dd3daf2836a524ebd20d794f02292f29d1e97aacfa957a487226a2a804d5d7

    • Size

      150KB

    • MD5

      1fb2fb6675c57bd3018eb2146cf2325f

    • SHA1

      3fb36483e6d84705ad2d8a04b2da1ed9ea9206af

    • SHA256

      02dd3daf2836a524ebd20d794f02292f29d1e97aacfa957a487226a2a804d5d7

    • SHA512

      9c6f8d66a88aa1f50c0b88dbfbe945bc1163055d44d2b9b8f978691a0411f60272f01414854e202bf2897b099bc6874843814ab60d323956ee5a47d62620cf5a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks