General

  • Target

    04d384313fea28c204bef8779a27d5f57b88fdeb2e2f041b78f6447beda5a154

  • Size

    192KB

  • Sample

    220212-nc6m6adcfp

  • MD5

    e0ee30e2965e2b28cc792a1777861bd3

  • SHA1

    b4fbf22df03a191feb3998c8926ce8ddf52fd0ca

  • SHA256

    04d384313fea28c204bef8779a27d5f57b88fdeb2e2f041b78f6447beda5a154

  • SHA512

    d2dfdb67e1b831777a41e41164babde24c3b6667ed72451f25d360a10bbb2abc41a4e2cf1e5cb6414cdc0690840219b8ea353180a6e1eb34fbb6b6d9c3e532c8

Malware Config

Targets

    • Target

      04d384313fea28c204bef8779a27d5f57b88fdeb2e2f041b78f6447beda5a154

    • Size

      192KB

    • MD5

      e0ee30e2965e2b28cc792a1777861bd3

    • SHA1

      b4fbf22df03a191feb3998c8926ce8ddf52fd0ca

    • SHA256

      04d384313fea28c204bef8779a27d5f57b88fdeb2e2f041b78f6447beda5a154

    • SHA512

      d2dfdb67e1b831777a41e41164babde24c3b6667ed72451f25d360a10bbb2abc41a4e2cf1e5cb6414cdc0690840219b8ea353180a6e1eb34fbb6b6d9c3e532c8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks