General

  • Target

    07f4bd795b0ccea1c9f2e29b9460b5d93c66af11ceca3fd880580f656d4c690c

  • Size

    92KB

  • Sample

    220212-l63ggscfcl

  • MD5

    041751e064912a021e025e141e1ce1bd

  • SHA1

    738a27708d6e6231980c73f61ac841b8d57fb438

  • SHA256

    07f4bd795b0ccea1c9f2e29b9460b5d93c66af11ceca3fd880580f656d4c690c

  • SHA512

    2293e7516e2602e4a3a9da3adf4e86f3e74371fd06e0ee5796f041519859cd4f3bd0f16052914e433815da751dd97ebab6724596b240a3d24090aa77f9cccb0c

Malware Config

Targets

    • Target

      07f4bd795b0ccea1c9f2e29b9460b5d93c66af11ceca3fd880580f656d4c690c

    • Size

      92KB

    • MD5

      041751e064912a021e025e141e1ce1bd

    • SHA1

      738a27708d6e6231980c73f61ac841b8d57fb438

    • SHA256

      07f4bd795b0ccea1c9f2e29b9460b5d93c66af11ceca3fd880580f656d4c690c

    • SHA512

      2293e7516e2602e4a3a9da3adf4e86f3e74371fd06e0ee5796f041519859cd4f3bd0f16052914e433815da751dd97ebab6724596b240a3d24090aa77f9cccb0c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks