General

  • Target

    171ae67809781c354e8432aeedd84bb3eaf83d349576dd345e3243cda2ec1eee

  • Size

    99KB

  • Sample

    220212-d7b2xsfef3

  • MD5

    4c6b59a14f1a41ce216a7f36611607f5

  • SHA1

    d40254548dfac75a498cd91921f0226d2c4d9573

  • SHA256

    171ae67809781c354e8432aeedd84bb3eaf83d349576dd345e3243cda2ec1eee

  • SHA512

    3f42525ea93c5e6cd3df2fb1acfa76576c8c0e16431c80b2a9a08d2cda6221b7e78cd7647694310619608b6766c9bcd3705cf945432b70a9cb9ba01377efc866

Malware Config

Targets

    • Target

      171ae67809781c354e8432aeedd84bb3eaf83d349576dd345e3243cda2ec1eee

    • Size

      99KB

    • MD5

      4c6b59a14f1a41ce216a7f36611607f5

    • SHA1

      d40254548dfac75a498cd91921f0226d2c4d9573

    • SHA256

      171ae67809781c354e8432aeedd84bb3eaf83d349576dd345e3243cda2ec1eee

    • SHA512

      3f42525ea93c5e6cd3df2fb1acfa76576c8c0e16431c80b2a9a08d2cda6221b7e78cd7647694310619608b6766c9bcd3705cf945432b70a9cb9ba01377efc866

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks