General

  • Target

    04eff09c854b26258fd56f94ba4684bc6965ff5e9582ea457009a0e140cf12ba

  • Size

    216KB

  • Sample

    220212-nb6a1adcel

  • MD5

    7aa6a04afde40e94ff0a1ef6240d82ca

  • SHA1

    e8c7e7ba9b967cfee3ebf23a4bb4f583d815963a

  • SHA256

    04eff09c854b26258fd56f94ba4684bc6965ff5e9582ea457009a0e140cf12ba

  • SHA512

    1544f39d7cf3ef535562e8a62cdf5c5d9736496ea532cdeacb8e486a35199a31c8ca4f07cfb277f882667b6336ad5156bffd94967058306194664d50dfdb9e17

Malware Config

Targets

    • Target

      04eff09c854b26258fd56f94ba4684bc6965ff5e9582ea457009a0e140cf12ba

    • Size

      216KB

    • MD5

      7aa6a04afde40e94ff0a1ef6240d82ca

    • SHA1

      e8c7e7ba9b967cfee3ebf23a4bb4f583d815963a

    • SHA256

      04eff09c854b26258fd56f94ba4684bc6965ff5e9582ea457009a0e140cf12ba

    • SHA512

      1544f39d7cf3ef535562e8a62cdf5c5d9736496ea532cdeacb8e486a35199a31c8ca4f07cfb277f882667b6336ad5156bffd94967058306194664d50dfdb9e17

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks