General

  • Target

    4d8f44743321704462cf4eb51ce02bb76a61cd139c88ad1b002ce27ed2a32095

  • Size

    92KB

  • Sample

    220712-c3cbfsaad2

  • MD5

    63f5bd325c3a0859d6715a36f87792d0

  • SHA1

    547c959992ee840dc37322e07df6a00d8dc0d794

  • SHA256

    4d8f44743321704462cf4eb51ce02bb76a61cd139c88ad1b002ce27ed2a32095

  • SHA512

    ba61472decc604d0f9e86b2d7d704695c4e87102a2a7144117770b7c2cbbab0ab6aaf7021aeff93872033080776f9747109e98117b3302d4561224f0f30b8cac

Malware Config

Targets

    • Target

      4d8f44743321704462cf4eb51ce02bb76a61cd139c88ad1b002ce27ed2a32095

    • Size

      92KB

    • MD5

      63f5bd325c3a0859d6715a36f87792d0

    • SHA1

      547c959992ee840dc37322e07df6a00d8dc0d794

    • SHA256

      4d8f44743321704462cf4eb51ce02bb76a61cd139c88ad1b002ce27ed2a32095

    • SHA512

      ba61472decc604d0f9e86b2d7d704695c4e87102a2a7144117770b7c2cbbab0ab6aaf7021aeff93872033080776f9747109e98117b3302d4561224f0f30b8cac

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks