General

  • Target

    04d26200d416145862b3664cd84369e788e21368152cf22f421c3a1c77d3ceba

  • Size

    216KB

  • Sample

    220212-ndal4sdcfr

  • MD5

    d07002162a23389343848cb78b4690f7

  • SHA1

    f8481401e0b6f884ebd8141ec62fffc81d752296

  • SHA256

    04d26200d416145862b3664cd84369e788e21368152cf22f421c3a1c77d3ceba

  • SHA512

    44e15087c7102908949e7a0e00f3412bedb2a7b2346dccb8746fe6e44010659853df0aa31738590e4f3a571f02423e6ae4af5f7f47eb0d627d7e269450276a2e

Malware Config

Targets

    • Target

      04d26200d416145862b3664cd84369e788e21368152cf22f421c3a1c77d3ceba

    • Size

      216KB

    • MD5

      d07002162a23389343848cb78b4690f7

    • SHA1

      f8481401e0b6f884ebd8141ec62fffc81d752296

    • SHA256

      04d26200d416145862b3664cd84369e788e21368152cf22f421c3a1c77d3ceba

    • SHA512

      44e15087c7102908949e7a0e00f3412bedb2a7b2346dccb8746fe6e44010659853df0aa31738590e4f3a571f02423e6ae4af5f7f47eb0d627d7e269450276a2e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks