General

  • Target

    171d951d30500240f623efd629ece6b9d00b77bd9436ef55285b7ff52209eb88

  • Size

    217KB

  • Sample

    220212-d67r7sfee9

  • MD5

    cafefaae6b3b3236a0a4a2dd79c94fde

  • SHA1

    7513c6b406bfae75c87c2ec4dcbc0c7a39cdaa47

  • SHA256

    171d951d30500240f623efd629ece6b9d00b77bd9436ef55285b7ff52209eb88

  • SHA512

    c409559b849e27a8686e709410f2524a27e20352bbcf402e20752e6a9ff5ab2d70bd751639e3144c694de5f2392e8ace2a050e62e590b2d57402c3c7e9cceb9f

Malware Config

Targets

    • Target

      171d951d30500240f623efd629ece6b9d00b77bd9436ef55285b7ff52209eb88

    • Size

      217KB

    • MD5

      cafefaae6b3b3236a0a4a2dd79c94fde

    • SHA1

      7513c6b406bfae75c87c2ec4dcbc0c7a39cdaa47

    • SHA256

      171d951d30500240f623efd629ece6b9d00b77bd9436ef55285b7ff52209eb88

    • SHA512

      c409559b849e27a8686e709410f2524a27e20352bbcf402e20752e6a9ff5ab2d70bd751639e3144c694de5f2392e8ace2a050e62e590b2d57402c3c7e9cceb9f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks