General

  • Target

    07bb84db3fd89dc657994a86c5d6263925b30e017f4c410e407ca5cb1a80c46b

  • Size

    176KB

  • Sample

    220212-maeafscfgr

  • MD5

    31cd2b9e8c5d3b66b0d1bf737f82ec1b

  • SHA1

    d0da5a4d039bee96e3aa2e26483cf717d0338861

  • SHA256

    07bb84db3fd89dc657994a86c5d6263925b30e017f4c410e407ca5cb1a80c46b

  • SHA512

    a0f1ec4191a4eefa24dc8296d8227ae561acba7bb0f51b862ef82477b3558990e671c8e8618c50daa7b82f679d5071511721eaa3dbd303575ae29b9e43ee93e8

Malware Config

Targets

    • Target

      07bb84db3fd89dc657994a86c5d6263925b30e017f4c410e407ca5cb1a80c46b

    • Size

      176KB

    • MD5

      31cd2b9e8c5d3b66b0d1bf737f82ec1b

    • SHA1

      d0da5a4d039bee96e3aa2e26483cf717d0338861

    • SHA256

      07bb84db3fd89dc657994a86c5d6263925b30e017f4c410e407ca5cb1a80c46b

    • SHA512

      a0f1ec4191a4eefa24dc8296d8227ae561acba7bb0f51b862ef82477b3558990e671c8e8618c50daa7b82f679d5071511721eaa3dbd303575ae29b9e43ee93e8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks