General

  • Target

    09f14e3d918529e322d1ecbde43f95eece0675fb4ae3d4ed9657ce2a5158a2b0

  • Size

    216KB

  • Sample

    220212-lfww1sccap

  • MD5

    495907c951217bb5412f101f5bfdeffd

  • SHA1

    917332208ab202c3872ee8060cf3646d35bc9690

  • SHA256

    09f14e3d918529e322d1ecbde43f95eece0675fb4ae3d4ed9657ce2a5158a2b0

  • SHA512

    b390121f058c5d12bbb5105cd2e35cf926371533cf5cc885212a4e307862dfdb247a785df2dcb49864684286fa1be8b19a7de815fe1383d4df66457a962a4d78

Malware Config

Targets

    • Target

      09f14e3d918529e322d1ecbde43f95eece0675fb4ae3d4ed9657ce2a5158a2b0

    • Size

      216KB

    • MD5

      495907c951217bb5412f101f5bfdeffd

    • SHA1

      917332208ab202c3872ee8060cf3646d35bc9690

    • SHA256

      09f14e3d918529e322d1ecbde43f95eece0675fb4ae3d4ed9657ce2a5158a2b0

    • SHA512

      b390121f058c5d12bbb5105cd2e35cf926371533cf5cc885212a4e307862dfdb247a785df2dcb49864684286fa1be8b19a7de815fe1383d4df66457a962a4d78

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks