General

  • Target

    1760df87e85ede5e73e088ca1a0857737791b5cf3567e777f63e299fa0338cce

  • Size

    80KB

  • Sample

    220212-d37b9sfec3

  • MD5

    e7630ffccb4763299a0070a2ac548cd7

  • SHA1

    acbab7272ffc3129829e71ee9e4fc2e0495a7922

  • SHA256

    1760df87e85ede5e73e088ca1a0857737791b5cf3567e777f63e299fa0338cce

  • SHA512

    22ba3ac9cafed17e11cb2d671e1abcf5c3de9a3d77ca5008b43cdcf370680a2237b412cc9ae31654cdb3788a29be278ccc8efef2ed7b42e99cf73616d05270b2

Malware Config

Targets

    • Target

      1760df87e85ede5e73e088ca1a0857737791b5cf3567e777f63e299fa0338cce

    • Size

      80KB

    • MD5

      e7630ffccb4763299a0070a2ac548cd7

    • SHA1

      acbab7272ffc3129829e71ee9e4fc2e0495a7922

    • SHA256

      1760df87e85ede5e73e088ca1a0857737791b5cf3567e777f63e299fa0338cce

    • SHA512

      22ba3ac9cafed17e11cb2d671e1abcf5c3de9a3d77ca5008b43cdcf370680a2237b412cc9ae31654cdb3788a29be278ccc8efef2ed7b42e99cf73616d05270b2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks