General

  • Target

    04eda4f3e4e7a8319062a82501d7428683858f6473f49240fe65a75310b7e2ab

  • Size

    216KB

  • Sample

    220212-nb8fcsdcem

  • MD5

    419055ad9faf61697088b7b6d57375a8

  • SHA1

    19732407915520838b827d3ec45560d24322bd97

  • SHA256

    04eda4f3e4e7a8319062a82501d7428683858f6473f49240fe65a75310b7e2ab

  • SHA512

    c185a7a1e0a1e611d394717e14bc985620119b60baff4b2fb1e440f04e546048236bc3c1adf265d751d36fd49bdd4cb2b01fa730091edaa84c42fa6ceea64789

Malware Config

Targets

    • Target

      04eda4f3e4e7a8319062a82501d7428683858f6473f49240fe65a75310b7e2ab

    • Size

      216KB

    • MD5

      419055ad9faf61697088b7b6d57375a8

    • SHA1

      19732407915520838b827d3ec45560d24322bd97

    • SHA256

      04eda4f3e4e7a8319062a82501d7428683858f6473f49240fe65a75310b7e2ab

    • SHA512

      c185a7a1e0a1e611d394717e14bc985620119b60baff4b2fb1e440f04e546048236bc3c1adf265d751d36fd49bdd4cb2b01fa730091edaa84c42fa6ceea64789

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks