General

  • Target

    0fc79c044278e99bf3f7d025d4e1338343edb35d8f73dd04faf3fe04dffb22a3

  • Size

    216KB

  • Sample

    220212-g98qfsafem

  • MD5

    49e0ba35ffc1c607e219605fb331acf3

  • SHA1

    395665e051584319835889fb9ec413c6be0c4c0c

  • SHA256

    0fc79c044278e99bf3f7d025d4e1338343edb35d8f73dd04faf3fe04dffb22a3

  • SHA512

    3bec0e101f9dd6f7cf1cc7232b0bb5298cdbea8747ca1f967dd2f903a6427b07fc12a2bf2af40870365081352721025f2484232ddd27084eea146e4d7cef0b5e

Malware Config

Targets

    • Target

      0fc79c044278e99bf3f7d025d4e1338343edb35d8f73dd04faf3fe04dffb22a3

    • Size

      216KB

    • MD5

      49e0ba35ffc1c607e219605fb331acf3

    • SHA1

      395665e051584319835889fb9ec413c6be0c4c0c

    • SHA256

      0fc79c044278e99bf3f7d025d4e1338343edb35d8f73dd04faf3fe04dffb22a3

    • SHA512

      3bec0e101f9dd6f7cf1cc7232b0bb5298cdbea8747ca1f967dd2f903a6427b07fc12a2bf2af40870365081352721025f2484232ddd27084eea146e4d7cef0b5e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks