General

  • Target

    194601cec6556d32a0777a70888496a0caf4d52566c9b799165cd29794a679f6

  • Size

    200KB

  • Sample

    220212-dcfrmagffj

  • MD5

    721d86feeecdcbf5b98b9345f865b6c9

  • SHA1

    d2a0986decdcc990b52bb0147303fdbe3080101d

  • SHA256

    194601cec6556d32a0777a70888496a0caf4d52566c9b799165cd29794a679f6

  • SHA512

    0f904d9eea0e7768d0274675556e7fe853d0b8de5f3a9ce5f30a38837f21e0a94d9add6b0939893f0269c47e0520da8496ab82f33c7752309c609c5d159eeb79

Malware Config

Targets

    • Target

      194601cec6556d32a0777a70888496a0caf4d52566c9b799165cd29794a679f6

    • Size

      200KB

    • MD5

      721d86feeecdcbf5b98b9345f865b6c9

    • SHA1

      d2a0986decdcc990b52bb0147303fdbe3080101d

    • SHA256

      194601cec6556d32a0777a70888496a0caf4d52566c9b799165cd29794a679f6

    • SHA512

      0f904d9eea0e7768d0274675556e7fe853d0b8de5f3a9ce5f30a38837f21e0a94d9add6b0939893f0269c47e0520da8496ab82f33c7752309c609c5d159eeb79

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks