General

  • Target

    13cd7918b96b5413fae5c52369dd7d3e4cd186b364c0ce772f6da4f9dd1bffc4

  • Size

    92KB

  • Sample

    220212-fpjedshhbj

  • MD5

    53b26ba7c8ec25b6828aaa3a776adeab

  • SHA1

    498ce435b813cf8502982345a9494c197df1cd3d

  • SHA256

    13cd7918b96b5413fae5c52369dd7d3e4cd186b364c0ce772f6da4f9dd1bffc4

  • SHA512

    04c627a24eed6a818fdc5f83a4a9513d0a04b1727a00e785136616662cfac2eca7b320cf2c91188da4102db5f81bd84dc0a42a8235568c8cb779f4dac61bd6c6

Malware Config

Targets

    • Target

      13cd7918b96b5413fae5c52369dd7d3e4cd186b364c0ce772f6da4f9dd1bffc4

    • Size

      92KB

    • MD5

      53b26ba7c8ec25b6828aaa3a776adeab

    • SHA1

      498ce435b813cf8502982345a9494c197df1cd3d

    • SHA256

      13cd7918b96b5413fae5c52369dd7d3e4cd186b364c0ce772f6da4f9dd1bffc4

    • SHA512

      04c627a24eed6a818fdc5f83a4a9513d0a04b1727a00e785136616662cfac2eca7b320cf2c91188da4102db5f81bd84dc0a42a8235568c8cb779f4dac61bd6c6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks