General

  • Target

    07d6db962047ecdba45d50b7a6924c97b183da573799bd3332d19718f0b02eb1

  • Size

    176KB

  • Sample

    220212-l8yajscfeq

  • MD5

    0ee4615e38766f612d2ad93259da9ac1

  • SHA1

    4c9a3c56651d5acd60303944676cd059e69cb574

  • SHA256

    07d6db962047ecdba45d50b7a6924c97b183da573799bd3332d19718f0b02eb1

  • SHA512

    773fccfd57efac08b14ead0d472b7bf021d75126d84482db86e1a3bddf58d3601dff4f2d86a310149c03255cffdc84c459f96401752ae82880adf944b9f03806

Malware Config

Targets

    • Target

      07d6db962047ecdba45d50b7a6924c97b183da573799bd3332d19718f0b02eb1

    • Size

      176KB

    • MD5

      0ee4615e38766f612d2ad93259da9ac1

    • SHA1

      4c9a3c56651d5acd60303944676cd059e69cb574

    • SHA256

      07d6db962047ecdba45d50b7a6924c97b183da573799bd3332d19718f0b02eb1

    • SHA512

      773fccfd57efac08b14ead0d472b7bf021d75126d84482db86e1a3bddf58d3601dff4f2d86a310149c03255cffdc84c459f96401752ae82880adf944b9f03806

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks