General

  • Target

    18ebf5a9b5bed13955e5c2cb0b11670a883a9ae30e04f0ec8441b8ca8d52f5aa

  • Size

    92KB

  • Sample

    220212-dgfmesggbj

  • MD5

    1110a2db947ca51e01229be38ec9b52e

  • SHA1

    05e079104486cba714bb08852a4bb2c8f09309fd

  • SHA256

    18ebf5a9b5bed13955e5c2cb0b11670a883a9ae30e04f0ec8441b8ca8d52f5aa

  • SHA512

    554da8b7ac567e893192b8a8421e0c23b6304f4c5799b825cf7c1985692219154ec3ba91ed7bd8c341d5a23774a513112dc60ab7b4f13d329ae674a4b95b3492

Malware Config

Targets

    • Target

      18ebf5a9b5bed13955e5c2cb0b11670a883a9ae30e04f0ec8441b8ca8d52f5aa

    • Size

      92KB

    • MD5

      1110a2db947ca51e01229be38ec9b52e

    • SHA1

      05e079104486cba714bb08852a4bb2c8f09309fd

    • SHA256

      18ebf5a9b5bed13955e5c2cb0b11670a883a9ae30e04f0ec8441b8ca8d52f5aa

    • SHA512

      554da8b7ac567e893192b8a8421e0c23b6304f4c5799b825cf7c1985692219154ec3ba91ed7bd8c341d5a23774a513112dc60ab7b4f13d329ae674a4b95b3492

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks