General

  • Target

    13f01a44eb23ad56a1788da69b9ea14bcebb0a42f41f72b441f45423dc7f340e

  • Size

    92KB

  • Sample

    220212-fl1t9shggk

  • MD5

    732b8ff426fd53d850d59e6cd5af53ba

  • SHA1

    f44d06c8d62c4778aaf526b400d9a1630ea166f9

  • SHA256

    13f01a44eb23ad56a1788da69b9ea14bcebb0a42f41f72b441f45423dc7f340e

  • SHA512

    a88f5f4f13a49014cd2c19d3aa947a23cb325e33b552487d72818703b56d3bed15620d3fbb15ec20b16896cb37c1ae69490d784e49b4a2061c20895b2f1ff69d

Malware Config

Targets

    • Target

      13f01a44eb23ad56a1788da69b9ea14bcebb0a42f41f72b441f45423dc7f340e

    • Size

      92KB

    • MD5

      732b8ff426fd53d850d59e6cd5af53ba

    • SHA1

      f44d06c8d62c4778aaf526b400d9a1630ea166f9

    • SHA256

      13f01a44eb23ad56a1788da69b9ea14bcebb0a42f41f72b441f45423dc7f340e

    • SHA512

      a88f5f4f13a49014cd2c19d3aa947a23cb325e33b552487d72818703b56d3bed15620d3fbb15ec20b16896cb37c1ae69490d784e49b4a2061c20895b2f1ff69d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks