General

  • Target

    07ac46223a951695b6180049372dfb05c366cae4f7731fb04277d051bfbd368f

  • Size

    150KB

  • Sample

    220212-ma85tscfhp

  • MD5

    3d9910ae0e104da7df59f33ad5ca9d36

  • SHA1

    30fa24937f0532c347d4f94c8ae9ae02298d27b6

  • SHA256

    07ac46223a951695b6180049372dfb05c366cae4f7731fb04277d051bfbd368f

  • SHA512

    f09f69d70ae19412d31415996d88c1c47696faa0e808117b8267b538b029c7d7a02c829a75c7f001d998b8abfb54ddff8736325b1fafe97a38b1f1d86ea54862

Malware Config

Targets

    • Target

      07ac46223a951695b6180049372dfb05c366cae4f7731fb04277d051bfbd368f

    • Size

      150KB

    • MD5

      3d9910ae0e104da7df59f33ad5ca9d36

    • SHA1

      30fa24937f0532c347d4f94c8ae9ae02298d27b6

    • SHA256

      07ac46223a951695b6180049372dfb05c366cae4f7731fb04277d051bfbd368f

    • SHA512

      f09f69d70ae19412d31415996d88c1c47696faa0e808117b8267b538b029c7d7a02c829a75c7f001d998b8abfb54ddff8736325b1fafe97a38b1f1d86ea54862

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks