General

  • Target

    13ee2fe32d359d7e06e4d8b9f692bac9bbe82c767ec67a9df2de95d2bbd8a988

  • Size

    92KB

  • Sample

    220212-fl6erahggl

  • MD5

    5582540088b0090318d8503c97963d4d

  • SHA1

    81734b693acfa28cea09ad80cc3087ac769c2ad9

  • SHA256

    13ee2fe32d359d7e06e4d8b9f692bac9bbe82c767ec67a9df2de95d2bbd8a988

  • SHA512

    a4738e8ff80f3de7d2bde5804d410e98aaf4e4e072c303fc47dbe9b5f18f435756dfd5fb9dab1b46aad1837c4da740fa83c3ae1957a0bdcb0013f444f0bfe63e

Malware Config

Targets

    • Target

      13ee2fe32d359d7e06e4d8b9f692bac9bbe82c767ec67a9df2de95d2bbd8a988

    • Size

      92KB

    • MD5

      5582540088b0090318d8503c97963d4d

    • SHA1

      81734b693acfa28cea09ad80cc3087ac769c2ad9

    • SHA256

      13ee2fe32d359d7e06e4d8b9f692bac9bbe82c767ec67a9df2de95d2bbd8a988

    • SHA512

      a4738e8ff80f3de7d2bde5804d410e98aaf4e4e072c303fc47dbe9b5f18f435756dfd5fb9dab1b46aad1837c4da740fa83c3ae1957a0bdcb0013f444f0bfe63e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks