General

  • Target

    18b2a4f3d41a4638151d53bb7ddf7db1df3e950245fab579e697fdef2b229eb5

  • Size

    200KB

  • Sample

    220212-dkkesaggem

  • MD5

    ecc2db2cfc568e55afe9124c2f1f2fd4

  • SHA1

    c9b98ca6ab1d5a4028384c737e6d98f77846619f

  • SHA256

    18b2a4f3d41a4638151d53bb7ddf7db1df3e950245fab579e697fdef2b229eb5

  • SHA512

    57acad01cbd79171c719ad1eca07ce26095d4094eb69b58387f8782d422556f5e16534e17ff08e68bbe9b0132bc5ddf5d45fd34459f8b6725b6c567809dc5aa6

Malware Config

Targets

    • Target

      18b2a4f3d41a4638151d53bb7ddf7db1df3e950245fab579e697fdef2b229eb5

    • Size

      200KB

    • MD5

      ecc2db2cfc568e55afe9124c2f1f2fd4

    • SHA1

      c9b98ca6ab1d5a4028384c737e6d98f77846619f

    • SHA256

      18b2a4f3d41a4638151d53bb7ddf7db1df3e950245fab579e697fdef2b229eb5

    • SHA512

      57acad01cbd79171c719ad1eca07ce26095d4094eb69b58387f8782d422556f5e16534e17ff08e68bbe9b0132bc5ddf5d45fd34459f8b6725b6c567809dc5aa6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • suricata: ET MALWARE SUSPICIOUS UA (iexplore)

      suricata: ET MALWARE SUSPICIOUS UA (iexplore)

    • suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

      suricata: ET MALWARE Sakula/Mivast RAT CnC Beacon 1

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks