General

  • Target

    07c8bc520d7ad838c071bb27dab9726a596aaa2569c9272e938285eed64f7167

  • Size

    92KB

  • Sample

    220212-l9ws4scfgk

  • MD5

    87475c079dea8c90c8f852b79f67fd0b

  • SHA1

    9de7bf064fe83f7f9e646962aecb6a69ea4975e1

  • SHA256

    07c8bc520d7ad838c071bb27dab9726a596aaa2569c9272e938285eed64f7167

  • SHA512

    2e445c505ed682c5a8feea79f6b8697144b0dcb026a3206f3eee421dad2642179ad74b66a3c32fb49a7cc43f916120735d9215ea0726652d5c06fb521862dcf2

Malware Config

Targets

    • Target

      07c8bc520d7ad838c071bb27dab9726a596aaa2569c9272e938285eed64f7167

    • Size

      92KB

    • MD5

      87475c079dea8c90c8f852b79f67fd0b

    • SHA1

      9de7bf064fe83f7f9e646962aecb6a69ea4975e1

    • SHA256

      07c8bc520d7ad838c071bb27dab9726a596aaa2569c9272e938285eed64f7167

    • SHA512

      2e445c505ed682c5a8feea79f6b8697144b0dcb026a3206f3eee421dad2642179ad74b66a3c32fb49a7cc43f916120735d9215ea0726652d5c06fb521862dcf2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks