General

  • Target

    001588d2dc87594c54abf313af7cbe72b5138b16c253b7356038c9213a3f8a1a

  • Size

    116KB

  • Sample

    220212-p4qlpaeccp

  • MD5

    de1ddc0a7cb7357a4f58f69eaad97863

  • SHA1

    28409e3d498ed4fe183026a1c0c884ffaf1225bd

  • SHA256

    001588d2dc87594c54abf313af7cbe72b5138b16c253b7356038c9213a3f8a1a

  • SHA512

    a3008c2e5f507b0972cdc823c48379624bfd4a0dc29d1fa380b0745b4cb5186221f7af979debe82812f016e6ebcd99504ff090a4f57787ecaf16db8bb2287b3d

Malware Config

Targets

    • Target

      001588d2dc87594c54abf313af7cbe72b5138b16c253b7356038c9213a3f8a1a

    • Size

      116KB

    • MD5

      de1ddc0a7cb7357a4f58f69eaad97863

    • SHA1

      28409e3d498ed4fe183026a1c0c884ffaf1225bd

    • SHA256

      001588d2dc87594c54abf313af7cbe72b5138b16c253b7356038c9213a3f8a1a

    • SHA512

      a3008c2e5f507b0972cdc823c48379624bfd4a0dc29d1fa380b0745b4cb5186221f7af979debe82812f016e6ebcd99504ff090a4f57787ecaf16db8bb2287b3d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks