General

  • Target

    174eb6dd0816041bb6e2c23d198d29ed00d17a163eabee2f30cf6dacc0989405

  • Size

    79KB

  • Sample

    220212-d4tgssfec9

  • MD5

    03a1a59a38f2e39bb1613c630f9afcfb

  • SHA1

    6ab49c556d09c1f3ee584dcd85d12214f61e498f

  • SHA256

    174eb6dd0816041bb6e2c23d198d29ed00d17a163eabee2f30cf6dacc0989405

  • SHA512

    fe55a99546497ebf156e97e40814fd1027bddd6478694f068ee5d9dbe7dd3588401cbc868ea10df468e9fad777d90596213371d408b732c920fbad7d016a7530

Malware Config

Targets

    • Target

      174eb6dd0816041bb6e2c23d198d29ed00d17a163eabee2f30cf6dacc0989405

    • Size

      79KB

    • MD5

      03a1a59a38f2e39bb1613c630f9afcfb

    • SHA1

      6ab49c556d09c1f3ee584dcd85d12214f61e498f

    • SHA256

      174eb6dd0816041bb6e2c23d198d29ed00d17a163eabee2f30cf6dacc0989405

    • SHA512

      fe55a99546497ebf156e97e40814fd1027bddd6478694f068ee5d9dbe7dd3588401cbc868ea10df468e9fad777d90596213371d408b732c920fbad7d016a7530

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks