General

  • Target

    07ed1cf4c1df030324da4e4d5cd43beea27b3daf3f942cf0c0330cabd2df32cf

  • Size

    216KB

  • Sample

    220212-l7b1xscfcn

  • MD5

    c216b8087383fc257efbf9d78b9308cd

  • SHA1

    e18ad2bd4c887c8c2af5de0158502becf84420fb

  • SHA256

    07ed1cf4c1df030324da4e4d5cd43beea27b3daf3f942cf0c0330cabd2df32cf

  • SHA512

    0f9036618368b57dd1c55561f12d1c93d181e1093076ca0db4c6c6e7f857e3f032b88657f2640a75f650ca6fa0f145305b4c4c440157fd0f4b630dd4eac97c9f

Malware Config

Targets

    • Target

      07ed1cf4c1df030324da4e4d5cd43beea27b3daf3f942cf0c0330cabd2df32cf

    • Size

      216KB

    • MD5

      c216b8087383fc257efbf9d78b9308cd

    • SHA1

      e18ad2bd4c887c8c2af5de0158502becf84420fb

    • SHA256

      07ed1cf4c1df030324da4e4d5cd43beea27b3daf3f942cf0c0330cabd2df32cf

    • SHA512

      0f9036618368b57dd1c55561f12d1c93d181e1093076ca0db4c6c6e7f857e3f032b88657f2640a75f650ca6fa0f145305b4c4c440157fd0f4b630dd4eac97c9f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks