General

  • Target

    13fa1c56a86cddf736b7e85523e6ce1550c29bfb88418433d4ba2ad3e90573ef

  • Size

    188KB

  • Sample

    220212-fle8kahgfk

  • MD5

    bf2365b497a8e5eda567745049f341ac

  • SHA1

    8f913e094412b0c8b7135c232b21e356bd1cc88d

  • SHA256

    13fa1c56a86cddf736b7e85523e6ce1550c29bfb88418433d4ba2ad3e90573ef

  • SHA512

    787ab8a7ed9e271e7e33a91b73c66fbd57a7508f8e89293696d8bbbaa1e166e5a45a1d0ce0ecb7ab9c86068b1c4556e24eee1da55ac7696ba3ddfa4cc4bfa65f

Malware Config

Targets

    • Target

      13fa1c56a86cddf736b7e85523e6ce1550c29bfb88418433d4ba2ad3e90573ef

    • Size

      188KB

    • MD5

      bf2365b497a8e5eda567745049f341ac

    • SHA1

      8f913e094412b0c8b7135c232b21e356bd1cc88d

    • SHA256

      13fa1c56a86cddf736b7e85523e6ce1550c29bfb88418433d4ba2ad3e90573ef

    • SHA512

      787ab8a7ed9e271e7e33a91b73c66fbd57a7508f8e89293696d8bbbaa1e166e5a45a1d0ce0ecb7ab9c86068b1c4556e24eee1da55ac7696ba3ddfa4cc4bfa65f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks