General

  • Target

    027e57ebf34cdfe6e4d33a8a5cf240a14607efe9a5c869679bde4db844fe97db

  • Size

    151KB

  • Sample

    220212-n9ekyadgfj

  • MD5

    5614516bf80c8304eb85327a4ff13455

  • SHA1

    de9f7cc46903b03d61ec632bf7b6c2ab3a618ee7

  • SHA256

    027e57ebf34cdfe6e4d33a8a5cf240a14607efe9a5c869679bde4db844fe97db

  • SHA512

    8ed99e6b7b14c7959f54aa0c34b2a08eed1acca757e433d160588ab42ce4c5ef36994fbbb91119f6c7ce0233e732d8bd195ff3544e3203a1f9680d8edad09c3a

Malware Config

Targets

    • Target

      027e57ebf34cdfe6e4d33a8a5cf240a14607efe9a5c869679bde4db844fe97db

    • Size

      151KB

    • MD5

      5614516bf80c8304eb85327a4ff13455

    • SHA1

      de9f7cc46903b03d61ec632bf7b6c2ab3a618ee7

    • SHA256

      027e57ebf34cdfe6e4d33a8a5cf240a14607efe9a5c869679bde4db844fe97db

    • SHA512

      8ed99e6b7b14c7959f54aa0c34b2a08eed1acca757e433d160588ab42ce4c5ef36994fbbb91119f6c7ce0233e732d8bd195ff3544e3203a1f9680d8edad09c3a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks