General

  • Target

    07f638b0d990399700617282f003043d881af7e6d05fe6707cffe5f1cfce467c

  • Size

    168KB

  • Sample

    220212-l61mwscfck

  • MD5

    177147967fe9cbac67f8b7b7cfcff07f

  • SHA1

    e360c70cfb231930b1d98588687279aa68299370

  • SHA256

    07f638b0d990399700617282f003043d881af7e6d05fe6707cffe5f1cfce467c

  • SHA512

    80527b3041676057c8e7aee4aa7b5545d19386c78f528441ac1c7d89bb6abc5bd3541f18a74c292a954f34d54c4421df2b6379ec298abb3e4ed80cce30cc65ca

Malware Config

Targets

    • Target

      07f638b0d990399700617282f003043d881af7e6d05fe6707cffe5f1cfce467c

    • Size

      168KB

    • MD5

      177147967fe9cbac67f8b7b7cfcff07f

    • SHA1

      e360c70cfb231930b1d98588687279aa68299370

    • SHA256

      07f638b0d990399700617282f003043d881af7e6d05fe6707cffe5f1cfce467c

    • SHA512

      80527b3041676057c8e7aee4aa7b5545d19386c78f528441ac1c7d89bb6abc5bd3541f18a74c292a954f34d54c4421df2b6379ec298abb3e4ed80cce30cc65ca

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks