General

  • Target

    09df7f868fcbeceab77ab28626cdf36aa8149f713de55aa252d360670142fc20

  • Size

    92KB

  • Sample

    220212-lgjcbaccbp

  • MD5

    022255e994619688171278ed7be66e5c

  • SHA1

    cfd6118709a49e81cbd34b1b06ddf909c725ece2

  • SHA256

    09df7f868fcbeceab77ab28626cdf36aa8149f713de55aa252d360670142fc20

  • SHA512

    a700b32503834821b42f0a7c012cf1da9dbcd68c69990c340c03f37411da66099803831d5caf2963e0d3d80c195a477c441ee2653cfdb8a0d4c593b58f3e5f7b

Malware Config

Targets

    • Target

      09df7f868fcbeceab77ab28626cdf36aa8149f713de55aa252d360670142fc20

    • Size

      92KB

    • MD5

      022255e994619688171278ed7be66e5c

    • SHA1

      cfd6118709a49e81cbd34b1b06ddf909c725ece2

    • SHA256

      09df7f868fcbeceab77ab28626cdf36aa8149f713de55aa252d360670142fc20

    • SHA512

      a700b32503834821b42f0a7c012cf1da9dbcd68c69990c340c03f37411da66099803831d5caf2963e0d3d80c195a477c441ee2653cfdb8a0d4c593b58f3e5f7b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks