General

  • Target

    07d2d26de0af6c094156dd382590574a6974342e36d1416d3f4bcbe052adb47c

  • Size

    92KB

  • Sample

    220212-l9hw9acffq

  • MD5

    c55b73c80a1abb5f5e6aa4c3003d77e9

  • SHA1

    2c37b5a1af1dd5823467f68af928799b0627f607

  • SHA256

    07d2d26de0af6c094156dd382590574a6974342e36d1416d3f4bcbe052adb47c

  • SHA512

    549ee2b0e4eff9f319d84234e71092bd2e6f0350f1122d35ae28e58ecaac90ad37b964a5dd61a51e0d1913f90cbb4d760d090222b31735ad809d8bda2a045509

Malware Config

Targets

    • Target

      07d2d26de0af6c094156dd382590574a6974342e36d1416d3f4bcbe052adb47c

    • Size

      92KB

    • MD5

      c55b73c80a1abb5f5e6aa4c3003d77e9

    • SHA1

      2c37b5a1af1dd5823467f68af928799b0627f607

    • SHA256

      07d2d26de0af6c094156dd382590574a6974342e36d1416d3f4bcbe052adb47c

    • SHA512

      549ee2b0e4eff9f319d84234e71092bd2e6f0350f1122d35ae28e58ecaac90ad37b964a5dd61a51e0d1913f90cbb4d760d090222b31735ad809d8bda2a045509

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks