General

  • Target

    0794b5d083295ea5e8af5f30d70e3e49ba9f37b93aed96756ef7a5b50de9d12a

  • Size

    176KB

  • Sample

    220212-mc1apscgbm

  • MD5

    6f3b7d29a54393bef502f60143662910

  • SHA1

    180b1835a5925637331ca6c94e2cd284cb7e7908

  • SHA256

    0794b5d083295ea5e8af5f30d70e3e49ba9f37b93aed96756ef7a5b50de9d12a

  • SHA512

    fe95144b14b7c18883d3016278fd5894873c74814ac65d0636b54f3d29936fbf4dd705f7d7ee2574bd1a114c085be9c726d2737103fa51a118551d96f5a7ed51

Malware Config

Targets

    • Target

      0794b5d083295ea5e8af5f30d70e3e49ba9f37b93aed96756ef7a5b50de9d12a

    • Size

      176KB

    • MD5

      6f3b7d29a54393bef502f60143662910

    • SHA1

      180b1835a5925637331ca6c94e2cd284cb7e7908

    • SHA256

      0794b5d083295ea5e8af5f30d70e3e49ba9f37b93aed96756ef7a5b50de9d12a

    • SHA512

      fe95144b14b7c18883d3016278fd5894873c74814ac65d0636b54f3d29936fbf4dd705f7d7ee2574bd1a114c085be9c726d2737103fa51a118551d96f5a7ed51

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks