General

  • Target

    07630fdaf2da244b299084c2936c281d7c106a6952180d7bde6cff73a73922ad

  • Size

    176KB

  • Sample

    220212-me3tlscgdq

  • MD5

    2cc064f619ed4c2aaf687be2da3ddb49

  • SHA1

    1d90b344c99dcfee4427335b4b3af8844946ccf8

  • SHA256

    07630fdaf2da244b299084c2936c281d7c106a6952180d7bde6cff73a73922ad

  • SHA512

    d53192d3686fa1dc11f73ea3b9e8db46b7181bad0e94c544c23efdd3a00c6ea36bb5de96022347700abf0a0509e2742b1df4df269bed575362960f63548751a0

Malware Config

Targets

    • Target

      07630fdaf2da244b299084c2936c281d7c106a6952180d7bde6cff73a73922ad

    • Size

      176KB

    • MD5

      2cc064f619ed4c2aaf687be2da3ddb49

    • SHA1

      1d90b344c99dcfee4427335b4b3af8844946ccf8

    • SHA256

      07630fdaf2da244b299084c2936c281d7c106a6952180d7bde6cff73a73922ad

    • SHA512

      d53192d3686fa1dc11f73ea3b9e8db46b7181bad0e94c544c23efdd3a00c6ea36bb5de96022347700abf0a0509e2742b1df4df269bed575362960f63548751a0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks