General

  • Target

    04d3415c5fd7ba2854f244e83d9f5012a4c9044f5517847a81f0d17e35bb40f2

  • Size

    150KB

  • Sample

    220212-nc8shsdcfq

  • MD5

    cbd00ac3ea7fb49eed57a5d19b1d60da

  • SHA1

    d07f81e9d4aabc8591ab94e860eae9e6fb2a2359

  • SHA256

    04d3415c5fd7ba2854f244e83d9f5012a4c9044f5517847a81f0d17e35bb40f2

  • SHA512

    f96a99d1541b3cc3d41bcad2490febd12d973206fc90de65f3a3106419cef8f449242ebd26b62f0e27bd507e7c57d7f9145ed88c42b5e2e3031dcabbaee91750

Malware Config

Targets

    • Target

      04d3415c5fd7ba2854f244e83d9f5012a4c9044f5517847a81f0d17e35bb40f2

    • Size

      150KB

    • MD5

      cbd00ac3ea7fb49eed57a5d19b1d60da

    • SHA1

      d07f81e9d4aabc8591ab94e860eae9e6fb2a2359

    • SHA256

      04d3415c5fd7ba2854f244e83d9f5012a4c9044f5517847a81f0d17e35bb40f2

    • SHA512

      f96a99d1541b3cc3d41bcad2490febd12d973206fc90de65f3a3106419cef8f449242ebd26b62f0e27bd507e7c57d7f9145ed88c42b5e2e3031dcabbaee91750

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks