General

  • Target

    12fb0a64c8841c5f642dc2a8170de9b681c3a62d2a82f47f6e2f49815809b0c1

  • Size

    150KB

  • Sample

    220212-f18hnaaadq

  • MD5

    99aced64a2b692ee854b5e015f177fcd

  • SHA1

    c32b6efcc09450bdb781082714a58f2d3deca78c

  • SHA256

    12fb0a64c8841c5f642dc2a8170de9b681c3a62d2a82f47f6e2f49815809b0c1

  • SHA512

    6ab54709c3e0e7a9ed23f0f3491ebab8e52650ac650097fd7323570eb69ee40de88cab521a3fb7cd32a63eeec94e401e0197657c63716c71abf12fb9bde8042f

Malware Config

Targets

    • Target

      12fb0a64c8841c5f642dc2a8170de9b681c3a62d2a82f47f6e2f49815809b0c1

    • Size

      150KB

    • MD5

      99aced64a2b692ee854b5e015f177fcd

    • SHA1

      c32b6efcc09450bdb781082714a58f2d3deca78c

    • SHA256

      12fb0a64c8841c5f642dc2a8170de9b681c3a62d2a82f47f6e2f49815809b0c1

    • SHA512

      6ab54709c3e0e7a9ed23f0f3491ebab8e52650ac650097fd7323570eb69ee40de88cab521a3fb7cd32a63eeec94e401e0197657c63716c71abf12fb9bde8042f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks