General

  • Target

    178be6c9f43af0b60eff229bba5eaa4ccf937c8410d61ef22e8b0a77efbec104

  • Size

    191KB

  • Sample

    220212-d1tndshacn

  • MD5

    8560d8b30a48b6bc26e8193fc86b6d8d

  • SHA1

    17c74321fc0ecdb43ce1d48fbf02cc018783bb26

  • SHA256

    178be6c9f43af0b60eff229bba5eaa4ccf937c8410d61ef22e8b0a77efbec104

  • SHA512

    001ffa22f34111955fab89322c962c7ea495be5052d5228578836c443b260ff8eb51c2b4b6caa833402991a9c33f6d59e603f53d7e52e3dcd6e7631f4c2b08d3

Malware Config

Targets

    • Target

      178be6c9f43af0b60eff229bba5eaa4ccf937c8410d61ef22e8b0a77efbec104

    • Size

      191KB

    • MD5

      8560d8b30a48b6bc26e8193fc86b6d8d

    • SHA1

      17c74321fc0ecdb43ce1d48fbf02cc018783bb26

    • SHA256

      178be6c9f43af0b60eff229bba5eaa4ccf937c8410d61ef22e8b0a77efbec104

    • SHA512

      001ffa22f34111955fab89322c962c7ea495be5052d5228578836c443b260ff8eb51c2b4b6caa833402991a9c33f6d59e603f53d7e52e3dcd6e7631f4c2b08d3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks