General

  • Target

    0a68141f15a71a4daf4c45952e24fb02b1c2f7534e345430c651c625ac3dd023

  • Size

    89KB

  • Sample

    220212-lapkracbdr

  • MD5

    2b208d904691d6f8c4b8200593567760

  • SHA1

    9c8d2b221448816d351f761c9c70cacbfa48d28f

  • SHA256

    0a68141f15a71a4daf4c45952e24fb02b1c2f7534e345430c651c625ac3dd023

  • SHA512

    bb1349c25156eaae13c005e301afbf032460b5211dd45423f88f858eb40448886d5bcf0d1003025092677646858d10a456e2b9dfa87744660c8dc8977180eab9

Malware Config

Targets

    • Target

      0a68141f15a71a4daf4c45952e24fb02b1c2f7534e345430c651c625ac3dd023

    • Size

      89KB

    • MD5

      2b208d904691d6f8c4b8200593567760

    • SHA1

      9c8d2b221448816d351f761c9c70cacbfa48d28f

    • SHA256

      0a68141f15a71a4daf4c45952e24fb02b1c2f7534e345430c651c625ac3dd023

    • SHA512

      bb1349c25156eaae13c005e301afbf032460b5211dd45423f88f858eb40448886d5bcf0d1003025092677646858d10a456e2b9dfa87744660c8dc8977180eab9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks