General

  • Target

    05026e020f6665004c53e920f717a3fe17ae87f9ad40208cce17e10839823168

  • Size

    216KB

  • Sample

    220212-na5yvadcdl

  • MD5

    2d2f325dbd799c40747d77b047d09d53

  • SHA1

    ba6160f3f8b8f6aba66d836dadfe95d766cd9709

  • SHA256

    05026e020f6665004c53e920f717a3fe17ae87f9ad40208cce17e10839823168

  • SHA512

    a7e4bc62ebe756532f03cacf342abf871751122e1ffe79e25eeaf87fa6fbbfe55b8072308da4e1a6809b512e74cf81613348e9d745877975c943df7010c0d67e

Malware Config

Targets

    • Target

      05026e020f6665004c53e920f717a3fe17ae87f9ad40208cce17e10839823168

    • Size

      216KB

    • MD5

      2d2f325dbd799c40747d77b047d09d53

    • SHA1

      ba6160f3f8b8f6aba66d836dadfe95d766cd9709

    • SHA256

      05026e020f6665004c53e920f717a3fe17ae87f9ad40208cce17e10839823168

    • SHA512

      a7e4bc62ebe756532f03cacf342abf871751122e1ffe79e25eeaf87fa6fbbfe55b8072308da4e1a6809b512e74cf81613348e9d745877975c943df7010c0d67e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks