General

  • Target

    13894253fd33ac23b260ecea521086a1a215234fdcdc8f1629fde7cddebde426

  • Size

    168KB

  • Sample

    220212-ftel1ahhfj

  • MD5

    1ea7537a80758a96cb4217388d9a32ee

  • SHA1

    0911f0554bf5fe42d3012184d94d4bed57e07f67

  • SHA256

    13894253fd33ac23b260ecea521086a1a215234fdcdc8f1629fde7cddebde426

  • SHA512

    85c9bb24af7eb783112232e427f48ab239de8d0587f34546184f509b80d5ed72679fb5ec900f1553b558d1624d997dc2a528b6a1f8ff58e83658c8e3bcead323

Malware Config

Targets

    • Target

      13894253fd33ac23b260ecea521086a1a215234fdcdc8f1629fde7cddebde426

    • Size

      168KB

    • MD5

      1ea7537a80758a96cb4217388d9a32ee

    • SHA1

      0911f0554bf5fe42d3012184d94d4bed57e07f67

    • SHA256

      13894253fd33ac23b260ecea521086a1a215234fdcdc8f1629fde7cddebde426

    • SHA512

      85c9bb24af7eb783112232e427f48ab239de8d0587f34546184f509b80d5ed72679fb5ec900f1553b558d1624d997dc2a528b6a1f8ff58e83658c8e3bcead323

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks