General

  • Target

    02da7bb3f9c8b5b09362211267344b6016e74e4a18ef3a821455c78ebac5d493

  • Size

    89KB

  • Sample

    220212-n488csdgaj

  • MD5

    a7b458591eb645b5d5d7abb84ebccbfb

  • SHA1

    a68a805de941e415819ec4e560d6e6e739c75164

  • SHA256

    02da7bb3f9c8b5b09362211267344b6016e74e4a18ef3a821455c78ebac5d493

  • SHA512

    3ee577dc7d0c87e45256558542953bdf249b6a0f8b4a31d5dd3f2bd4daa42cb1627d92cff9a899439a9fce12d139e842e8c7170950b91837a42beb1b36e909d5

Malware Config

Targets

    • Target

      02da7bb3f9c8b5b09362211267344b6016e74e4a18ef3a821455c78ebac5d493

    • Size

      89KB

    • MD5

      a7b458591eb645b5d5d7abb84ebccbfb

    • SHA1

      a68a805de941e415819ec4e560d6e6e739c75164

    • SHA256

      02da7bb3f9c8b5b09362211267344b6016e74e4a18ef3a821455c78ebac5d493

    • SHA512

      3ee577dc7d0c87e45256558542953bdf249b6a0f8b4a31d5dd3f2bd4daa42cb1627d92cff9a899439a9fce12d139e842e8c7170950b91837a42beb1b36e909d5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks