General

  • Target

    173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b

  • Size

    80KB

  • Sample

    220212-d5qsashagq

  • MD5

    c3b9c7da9478ef797e20c39f3eaca30f

  • SHA1

    95d76717ba0fbced700fd65e9777aa7b7ead131f

  • SHA256

    173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b

  • SHA512

    7e103c54fab4bfb00360da06a79feca3ac0c53eaf6228fb027b7d26cfbfd718129f5abcbeebec1891913968616d49ccaf40f4a39f99e13f0bc004d58789a9539

Malware Config

Targets

    • Target

      173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b

    • Size

      80KB

    • MD5

      c3b9c7da9478ef797e20c39f3eaca30f

    • SHA1

      95d76717ba0fbced700fd65e9777aa7b7ead131f

    • SHA256

      173af2eac22a725fba263869b74d122159dc2c88726bd4cd3903fd886619747b

    • SHA512

      7e103c54fab4bfb00360da06a79feca3ac0c53eaf6228fb027b7d26cfbfd718129f5abcbeebec1891913968616d49ccaf40f4a39f99e13f0bc004d58789a9539

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks