General

  • Target

    07aa8c466ed795395f27a537782d6981cc538dcd6f077808c56fa66b3a4f9fb3

  • Size

    92KB

  • Sample

    220212-mbkhvscgaj

  • MD5

    dfdba3ec8b6b8b204ee1aae2a9b46c69

  • SHA1

    c11a4d773ab93c0fc933f075611d72eb3d7d59c4

  • SHA256

    07aa8c466ed795395f27a537782d6981cc538dcd6f077808c56fa66b3a4f9fb3

  • SHA512

    02a5d48b039f16311ca2df62a62dc87e63fe251e8c6f4584de5d344e4d9c3e22746c39922f0f3e17377d370039332e797d2d177f74b0604787f2892ab83e7ec5

Malware Config

Targets

    • Target

      07aa8c466ed795395f27a537782d6981cc538dcd6f077808c56fa66b3a4f9fb3

    • Size

      92KB

    • MD5

      dfdba3ec8b6b8b204ee1aae2a9b46c69

    • SHA1

      c11a4d773ab93c0fc933f075611d72eb3d7d59c4

    • SHA256

      07aa8c466ed795395f27a537782d6981cc538dcd6f077808c56fa66b3a4f9fb3

    • SHA512

      02a5d48b039f16311ca2df62a62dc87e63fe251e8c6f4584de5d344e4d9c3e22746c39922f0f3e17377d370039332e797d2d177f74b0604787f2892ab83e7ec5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks