General

  • Target

    21f06f909bf7716296251e0cbbebf97d5374090b2995432822f69da998a7e0bc

  • Size

    517KB

  • Sample

    220612-hqe5gafab7

  • MD5

    52d7f40c84ab99a9b25ea423ebc907f4

  • SHA1

    9b56fddb420f1eaa78eae01473c4c22cfac1aa4f

  • SHA256

    21f06f909bf7716296251e0cbbebf97d5374090b2995432822f69da998a7e0bc

  • SHA512

    1678c49475ad6d86b983e6b106e06b3af5f8a743039931a84668a9265541fbb49f4e1e4217e649761a7c8deacb59a6ae9b1e8fdd103da6f1791b75280c92ea8e

Malware Config

Targets

    • Target

      21f06f909bf7716296251e0cbbebf97d5374090b2995432822f69da998a7e0bc

    • Size

      517KB

    • MD5

      52d7f40c84ab99a9b25ea423ebc907f4

    • SHA1

      9b56fddb420f1eaa78eae01473c4c22cfac1aa4f

    • SHA256

      21f06f909bf7716296251e0cbbebf97d5374090b2995432822f69da998a7e0bc

    • SHA512

      1678c49475ad6d86b983e6b106e06b3af5f8a743039931a84668a9265541fbb49f4e1e4217e649761a7c8deacb59a6ae9b1e8fdd103da6f1791b75280c92ea8e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks