General

  • Target

    0fcd130df086cd9bdf6e2e74937ccb75915e93b873f934b895b38b714ba2230b

  • Size

    150KB

  • Sample

    220212-g9xm7aafej

  • MD5

    c74a9948687d6f8c74d235c1c00b79b6

  • SHA1

    fbcbc71ae8e025f20b4e9cf4d1f58e005991d702

  • SHA256

    0fcd130df086cd9bdf6e2e74937ccb75915e93b873f934b895b38b714ba2230b

  • SHA512

    c5fa4f35c0271d32acf0c46f2c6352878249f7acb53bc5744228dbe81cdf954e78c8f22ad2638fc057613860e7e9a0d46d8b836b41a0838b40fe68030a7c44bb

Malware Config

Targets

    • Target

      0fcd130df086cd9bdf6e2e74937ccb75915e93b873f934b895b38b714ba2230b

    • Size

      150KB

    • MD5

      c74a9948687d6f8c74d235c1c00b79b6

    • SHA1

      fbcbc71ae8e025f20b4e9cf4d1f58e005991d702

    • SHA256

      0fcd130df086cd9bdf6e2e74937ccb75915e93b873f934b895b38b714ba2230b

    • SHA512

      c5fa4f35c0271d32acf0c46f2c6352878249f7acb53bc5744228dbe81cdf954e78c8f22ad2638fc057613860e7e9a0d46d8b836b41a0838b40fe68030a7c44bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks