General

  • Target

    131bd3d6b2ae85244524b2401cae00dab3356896f2c4c622e64ca528407a69bb

  • Size

    216KB

  • Sample

    220212-fzm6bsaacl

  • MD5

    af997fdf80c0abdf38051a9de28ca374

  • SHA1

    f62987f2ba976e6ef532f89fec0a08e1026bdfe7

  • SHA256

    131bd3d6b2ae85244524b2401cae00dab3356896f2c4c622e64ca528407a69bb

  • SHA512

    d20a388d703d044c2edd60cdc2fa3c7e94de1abcd12eb521f84c236d9ae399cce1baef9548cde7a7a98f64a196557a256c1ee3c0de204f9d4ed344a3da117553

Malware Config

Targets

    • Target

      131bd3d6b2ae85244524b2401cae00dab3356896f2c4c622e64ca528407a69bb

    • Size

      216KB

    • MD5

      af997fdf80c0abdf38051a9de28ca374

    • SHA1

      f62987f2ba976e6ef532f89fec0a08e1026bdfe7

    • SHA256

      131bd3d6b2ae85244524b2401cae00dab3356896f2c4c622e64ca528407a69bb

    • SHA512

      d20a388d703d044c2edd60cdc2fa3c7e94de1abcd12eb521f84c236d9ae399cce1baef9548cde7a7a98f64a196557a256c1ee3c0de204f9d4ed344a3da117553

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks