General

  • Target

    176917084fb51accecde70308b25bf21dd9c216cafd5518534acecaa9d31aa52

  • Size

    80KB

  • Sample

    220212-d3q1aahaeq

  • MD5

    9041a568a72c6aad8398030b228696bd

  • SHA1

    1a1261ef4e98b31e88263b1118e76733d1ad5fa2

  • SHA256

    176917084fb51accecde70308b25bf21dd9c216cafd5518534acecaa9d31aa52

  • SHA512

    279af9cea13b21b42e7fccbb3622636b9520ba3934d1bf5f5e5d2c4ab33b300c02983111f7166181ff8b2900421aa92796ebe3090c3a46593b4d4902bd611bc3

Malware Config

Targets

    • Target

      176917084fb51accecde70308b25bf21dd9c216cafd5518534acecaa9d31aa52

    • Size

      80KB

    • MD5

      9041a568a72c6aad8398030b228696bd

    • SHA1

      1a1261ef4e98b31e88263b1118e76733d1ad5fa2

    • SHA256

      176917084fb51accecde70308b25bf21dd9c216cafd5518534acecaa9d31aa52

    • SHA512

      279af9cea13b21b42e7fccbb3622636b9520ba3934d1bf5f5e5d2c4ab33b300c02983111f7166181ff8b2900421aa92796ebe3090c3a46593b4d4902bd611bc3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks