General

  • Target

    01f9db6e5ce9a74a65aaf35e5b56b597befc125c9f0648b8ec5aaa5dca066288

  • Size

    150KB

  • Sample

    220212-pgdzdadhem

  • MD5

    42890eea13cd0f7359bc560bbc19eb7f

  • SHA1

    1630525b7cc0e6452afa4a762581d93a30e0d95c

  • SHA256

    01f9db6e5ce9a74a65aaf35e5b56b597befc125c9f0648b8ec5aaa5dca066288

  • SHA512

    fa1b56dc573342956f6ae25ac3c6332c5be7bcb02f572d6125d1dfb1d46e492157199005f7f5c8cb73245c0120f85f2c4b4dcf2350099106c64491985d41f2b0

Malware Config

Targets

    • Target

      01f9db6e5ce9a74a65aaf35e5b56b597befc125c9f0648b8ec5aaa5dca066288

    • Size

      150KB

    • MD5

      42890eea13cd0f7359bc560bbc19eb7f

    • SHA1

      1630525b7cc0e6452afa4a762581d93a30e0d95c

    • SHA256

      01f9db6e5ce9a74a65aaf35e5b56b597befc125c9f0648b8ec5aaa5dca066288

    • SHA512

      fa1b56dc573342956f6ae25ac3c6332c5be7bcb02f572d6125d1dfb1d46e492157199005f7f5c8cb73245c0120f85f2c4b4dcf2350099106c64491985d41f2b0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks