General

  • Target

    077697054557d824c60c65f9808da1e901682056c2bcca7daddccff97bcc8fe6

  • Size

    92KB

  • Sample

    220212-mecx7acgcr

  • MD5

    71f469662179609e5a39b7e450b18a40

  • SHA1

    f35af5942d3b2034aea4a41c69c29b5d6ebd1355

  • SHA256

    077697054557d824c60c65f9808da1e901682056c2bcca7daddccff97bcc8fe6

  • SHA512

    119cd8cdeaa4a8d6b2a6a7d8be0c79d1fa599ef9a11a8de29ae984e423bcf0025e09c48e7e0652735c809519c9e0bc8d2118cb801f519590bd72521affc57e09

Malware Config

Targets

    • Target

      077697054557d824c60c65f9808da1e901682056c2bcca7daddccff97bcc8fe6

    • Size

      92KB

    • MD5

      71f469662179609e5a39b7e450b18a40

    • SHA1

      f35af5942d3b2034aea4a41c69c29b5d6ebd1355

    • SHA256

      077697054557d824c60c65f9808da1e901682056c2bcca7daddccff97bcc8fe6

    • SHA512

      119cd8cdeaa4a8d6b2a6a7d8be0c79d1fa599ef9a11a8de29ae984e423bcf0025e09c48e7e0652735c809519c9e0bc8d2118cb801f519590bd72521affc57e09

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks