General

  • Target

    18c0abe35667a81e4ed7a13a29567dd102e7e90b0b4c995a6af6ac0a44a83dc6

  • Size

    216KB

  • Sample

    220212-djne2sggdp

  • MD5

    5a07cc6277efe7cc6edb3b184b2a1e59

  • SHA1

    c3ace9b7fb1310f614b98d6c0f5e96ff4bece8cb

  • SHA256

    18c0abe35667a81e4ed7a13a29567dd102e7e90b0b4c995a6af6ac0a44a83dc6

  • SHA512

    50e1a5ea9f3c328eed8b9065c84e3c26abfe7f2805e113eab876c70506501293c06ac6f97343b1a509ea0e457e9c1e641939b4cac55dc4213a337704b845367c

Malware Config

Targets

    • Target

      18c0abe35667a81e4ed7a13a29567dd102e7e90b0b4c995a6af6ac0a44a83dc6

    • Size

      216KB

    • MD5

      5a07cc6277efe7cc6edb3b184b2a1e59

    • SHA1

      c3ace9b7fb1310f614b98d6c0f5e96ff4bece8cb

    • SHA256

      18c0abe35667a81e4ed7a13a29567dd102e7e90b0b4c995a6af6ac0a44a83dc6

    • SHA512

      50e1a5ea9f3c328eed8b9065c84e3c26abfe7f2805e113eab876c70506501293c06ac6f97343b1a509ea0e457e9c1e641939b4cac55dc4213a337704b845367c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks