General

  • Target

    079548a69a2c612c018d93b7528002b35556b540b5694d6331b49f2c9a762a44

  • Size

    176KB

  • Sample

    220212-mcyf4scgbl

  • MD5

    8f510328f470b1e3d651d51ce28ba92e

  • SHA1

    870febb32fe676f5ccad7a515dc90d04984b9a76

  • SHA256

    079548a69a2c612c018d93b7528002b35556b540b5694d6331b49f2c9a762a44

  • SHA512

    6e55a0d0a88a135b38b7174758cc12091db716bb427687e18ad153a175b20e90befd4acaea6cf63555089e35ab7fa8f80941bb9ccd16f8da6cefb86400fa7379

Malware Config

Targets

    • Target

      079548a69a2c612c018d93b7528002b35556b540b5694d6331b49f2c9a762a44

    • Size

      176KB

    • MD5

      8f510328f470b1e3d651d51ce28ba92e

    • SHA1

      870febb32fe676f5ccad7a515dc90d04984b9a76

    • SHA256

      079548a69a2c612c018d93b7528002b35556b540b5694d6331b49f2c9a762a44

    • SHA512

      6e55a0d0a88a135b38b7174758cc12091db716bb427687e18ad153a175b20e90befd4acaea6cf63555089e35ab7fa8f80941bb9ccd16f8da6cefb86400fa7379

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks