General

  • Target

    00294abacc05833597cb3a039250919efc152945e5b64e54b332e52fc0316e8b

  • Size

    150KB

  • Sample

    220212-p3qv3aecbp

  • MD5

    0efd3f211f8e6cbd171dab5c02e9eb02

  • SHA1

    1afbf883fb29cc9bc470a4192624bcb30aaa7a83

  • SHA256

    00294abacc05833597cb3a039250919efc152945e5b64e54b332e52fc0316e8b

  • SHA512

    6ab0e77a601c80f41b50140d7b21ab0f09d7f08060a4a727a2970164c486a438d096dc9807f349a46ac3ae377064b65fc20284d54d289542108af2d9367a8734

Malware Config

Targets

    • Target

      00294abacc05833597cb3a039250919efc152945e5b64e54b332e52fc0316e8b

    • Size

      150KB

    • MD5

      0efd3f211f8e6cbd171dab5c02e9eb02

    • SHA1

      1afbf883fb29cc9bc470a4192624bcb30aaa7a83

    • SHA256

      00294abacc05833597cb3a039250919efc152945e5b64e54b332e52fc0316e8b

    • SHA512

      6ab0e77a601c80f41b50140d7b21ab0f09d7f08060a4a727a2970164c486a438d096dc9807f349a46ac3ae377064b65fc20284d54d289542108af2d9367a8734

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks