General

  • Target

    04ea9fea1499708c74164e4dd15c7ac318d42310cd3644a390c200ee8a4b0244

  • Size

    150KB

  • Sample

    220212-nccebadcep

  • MD5

    f463627940b19d5419411a4bb290024b

  • SHA1

    00086d89d4086157f0c4f3b32b8b99e8f2b7428f

  • SHA256

    04ea9fea1499708c74164e4dd15c7ac318d42310cd3644a390c200ee8a4b0244

  • SHA512

    50d07f4c57bf82be2c6d713c7db72b11559045086a32da2a6a48281589f59d2d2d06704c71613734d44b8bdabb18fe81d3a04f3011d5c0a7a6311fb594160e65

Malware Config

Targets

    • Target

      04ea9fea1499708c74164e4dd15c7ac318d42310cd3644a390c200ee8a4b0244

    • Size

      150KB

    • MD5

      f463627940b19d5419411a4bb290024b

    • SHA1

      00086d89d4086157f0c4f3b32b8b99e8f2b7428f

    • SHA256

      04ea9fea1499708c74164e4dd15c7ac318d42310cd3644a390c200ee8a4b0244

    • SHA512

      50d07f4c57bf82be2c6d713c7db72b11559045086a32da2a6a48281589f59d2d2d06704c71613734d44b8bdabb18fe81d3a04f3011d5c0a7a6311fb594160e65

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks