General

  • Target

    14399a05b63567f65ca79e1e37fa6bfe18b000fafd4c925a91cf89c766477613

  • Size

    220KB

  • Sample

    220212-fg2wrshgbk

  • MD5

    3746d51f378b950dca5ad04087cd8fd6

  • SHA1

    41acbd38c1c5239108d6863cb1ec2c5a695e29a9

  • SHA256

    14399a05b63567f65ca79e1e37fa6bfe18b000fafd4c925a91cf89c766477613

  • SHA512

    091baec49264aecb825bf4a07cea0fecb2f50197eb2915bf2c829ad17a57b539f30e461b2943f2dcfc1ed3afe95190c2a6a9811be025d49eb2df833c8e539491

Malware Config

Targets

    • Target

      14399a05b63567f65ca79e1e37fa6bfe18b000fafd4c925a91cf89c766477613

    • Size

      220KB

    • MD5

      3746d51f378b950dca5ad04087cd8fd6

    • SHA1

      41acbd38c1c5239108d6863cb1ec2c5a695e29a9

    • SHA256

      14399a05b63567f65ca79e1e37fa6bfe18b000fafd4c925a91cf89c766477613

    • SHA512

      091baec49264aecb825bf4a07cea0fecb2f50197eb2915bf2c829ad17a57b539f30e461b2943f2dcfc1ed3afe95190c2a6a9811be025d49eb2df833c8e539491

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks