General

  • Target

    18b41a6cc32cca376596a78cb69304eb1dffee418fb481a0d8a14060cdb0b1b1

  • Size

    160KB

  • Sample

    220212-dj82raggek

  • MD5

    d044e48db357f441edee31c821c1ec31

  • SHA1

    58a814669a5bfc9cd4add60a28ebf57dccc9faae

  • SHA256

    18b41a6cc32cca376596a78cb69304eb1dffee418fb481a0d8a14060cdb0b1b1

  • SHA512

    25a756d86e1f5604b00be28226b45faac774b96ef22e6a8135fc1b88f435b53a7b5e1da1ec738c3474d01b12d987575dab4c4118fb3b36d8a3e065898abfb17f

Malware Config

Targets

    • Target

      18b41a6cc32cca376596a78cb69304eb1dffee418fb481a0d8a14060cdb0b1b1

    • Size

      160KB

    • MD5

      d044e48db357f441edee31c821c1ec31

    • SHA1

      58a814669a5bfc9cd4add60a28ebf57dccc9faae

    • SHA256

      18b41a6cc32cca376596a78cb69304eb1dffee418fb481a0d8a14060cdb0b1b1

    • SHA512

      25a756d86e1f5604b00be28226b45faac774b96ef22e6a8135fc1b88f435b53a7b5e1da1ec738c3474d01b12d987575dab4c4118fb3b36d8a3e065898abfb17f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks