General

  • Target

    079dc0972907f527d50659283d6a64f4c336279812e87ad429b23792cab2e0da

  • Size

    100KB

  • Sample

    220212-mcc56scgar

  • MD5

    cad0ce7e8c118a6eaf246627146f2113

  • SHA1

    c5746bdaa4be3a30e400b2565d581c1038fd392c

  • SHA256

    079dc0972907f527d50659283d6a64f4c336279812e87ad429b23792cab2e0da

  • SHA512

    b4fd1e3fe362c61fe22d1514a3c06e6baf5fd1c4d1edcb21d6f4ea0882a7ca94b45fada976fa9fe64230ae7e8f6b090b84f9d422bb27239f25ac6d6c7c3102dd

Malware Config

Targets

    • Target

      079dc0972907f527d50659283d6a64f4c336279812e87ad429b23792cab2e0da

    • Size

      100KB

    • MD5

      cad0ce7e8c118a6eaf246627146f2113

    • SHA1

      c5746bdaa4be3a30e400b2565d581c1038fd392c

    • SHA256

      079dc0972907f527d50659283d6a64f4c336279812e87ad429b23792cab2e0da

    • SHA512

      b4fd1e3fe362c61fe22d1514a3c06e6baf5fd1c4d1edcb21d6f4ea0882a7ca94b45fada976fa9fe64230ae7e8f6b090b84f9d422bb27239f25ac6d6c7c3102dd

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks