General

  • Target

    179306e777683587193e75d82b644443101eb09b7b2e02dc8cd20878f50ec43d

  • Size

    89KB

  • Sample

    220212-d1dbeafdh6

  • MD5

    9f927a86c3324d301f9b8d7af0953ee0

  • SHA1

    6b26476d0c8b654c204a3e1ed12ebc84522485cd

  • SHA256

    179306e777683587193e75d82b644443101eb09b7b2e02dc8cd20878f50ec43d

  • SHA512

    39394b21b8e5ba12013545aa91d3ad0f169abc513d2d88feecf37b5ac64a1f2a9c140153f7d47a7c54b224cf28fe7f943e9c9555904652ea7de74d8c1ffb3006

Malware Config

Targets

    • Target

      179306e777683587193e75d82b644443101eb09b7b2e02dc8cd20878f50ec43d

    • Size

      89KB

    • MD5

      9f927a86c3324d301f9b8d7af0953ee0

    • SHA1

      6b26476d0c8b654c204a3e1ed12ebc84522485cd

    • SHA256

      179306e777683587193e75d82b644443101eb09b7b2e02dc8cd20878f50ec43d

    • SHA512

      39394b21b8e5ba12013545aa91d3ad0f169abc513d2d88feecf37b5ac64a1f2a9c140153f7d47a7c54b224cf28fe7f943e9c9555904652ea7de74d8c1ffb3006

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks