General

  • Target

    04fce09c465c6b721fd2df7a04eb5d196ac1ea75dad2df581f5acdcd25dded24

  • Size

    176KB

  • Sample

    220212-nbh6gadcdn

  • MD5

    9fe88552c156c205b66e829e5751642b

  • SHA1

    de39ac170ebe7488f1a47a280cddec69668cd05f

  • SHA256

    04fce09c465c6b721fd2df7a04eb5d196ac1ea75dad2df581f5acdcd25dded24

  • SHA512

    b778df72d0a1ea252ee9d00d3c2813ff0d88eea46002922dfc3a50b8cb6b90f36580551a05ca72f99a08e339972833497f4c795a23ee19cccc72d3d0709d3da6

Malware Config

Targets

    • Target

      04fce09c465c6b721fd2df7a04eb5d196ac1ea75dad2df581f5acdcd25dded24

    • Size

      176KB

    • MD5

      9fe88552c156c205b66e829e5751642b

    • SHA1

      de39ac170ebe7488f1a47a280cddec69668cd05f

    • SHA256

      04fce09c465c6b721fd2df7a04eb5d196ac1ea75dad2df581f5acdcd25dded24

    • SHA512

      b778df72d0a1ea252ee9d00d3c2813ff0d88eea46002922dfc3a50b8cb6b90f36580551a05ca72f99a08e339972833497f4c795a23ee19cccc72d3d0709d3da6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks