General

  • Target

    04b925c26b1fb3610ced0dfc22885c3cc3f18b23409754197a4a7081cf376354

  • Size

    188KB

  • Sample

    220212-nepsesdchl

  • MD5

    c5886598e7a068ed4da4048a2779597a

  • SHA1

    64fa69cffaf1b9e1e7f691aac0945569909bd15c

  • SHA256

    04b925c26b1fb3610ced0dfc22885c3cc3f18b23409754197a4a7081cf376354

  • SHA512

    2ced7f6eea7629e03e18ad74224eb51f407d51f5490a00d4e77c5b17b875cb10d2663bb295ae211cd150bad496ea7ede3210d87969d64da763912e5fa1c9f6cb

Malware Config

Targets

    • Target

      04b925c26b1fb3610ced0dfc22885c3cc3f18b23409754197a4a7081cf376354

    • Size

      188KB

    • MD5

      c5886598e7a068ed4da4048a2779597a

    • SHA1

      64fa69cffaf1b9e1e7f691aac0945569909bd15c

    • SHA256

      04b925c26b1fb3610ced0dfc22885c3cc3f18b23409754197a4a7081cf376354

    • SHA512

      2ced7f6eea7629e03e18ad74224eb51f407d51f5490a00d4e77c5b17b875cb10d2663bb295ae211cd150bad496ea7ede3210d87969d64da763912e5fa1c9f6cb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks