General

  • Target

    078dd28f2810b9a3a9589bfd5e29e80bd14624bc42ce56b5865707bea5a2f210

  • Size

    176KB

  • Sample

    220212-mdbczacgbr

  • MD5

    bddd5dcfa53a5a205fb047be56d00479

  • SHA1

    1f42c2131e0a8b4e123d44d9aa7012b91892f8b8

  • SHA256

    078dd28f2810b9a3a9589bfd5e29e80bd14624bc42ce56b5865707bea5a2f210

  • SHA512

    48cb8a38218562286b7aaadb56f09e5ca9cf0342ec037966f6a1dc26fcc3caccc292fe784ea629e9f76337728f5d9f0b07eab9c85ed7b143c1459cd46acb0d56

Malware Config

Targets

    • Target

      078dd28f2810b9a3a9589bfd5e29e80bd14624bc42ce56b5865707bea5a2f210

    • Size

      176KB

    • MD5

      bddd5dcfa53a5a205fb047be56d00479

    • SHA1

      1f42c2131e0a8b4e123d44d9aa7012b91892f8b8

    • SHA256

      078dd28f2810b9a3a9589bfd5e29e80bd14624bc42ce56b5865707bea5a2f210

    • SHA512

      48cb8a38218562286b7aaadb56f09e5ca9cf0342ec037966f6a1dc26fcc3caccc292fe784ea629e9f76337728f5d9f0b07eab9c85ed7b143c1459cd46acb0d56

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks