General

  • Target

    196226537038edf32fb5d2f4845ac60f5b0c1f80c99dc39518cca32617904b2e

  • Size

    192KB

  • Sample

    220212-dbj3nagfej

  • MD5

    2d5fde9ea0e4b71dcd627a5d1cccc532

  • SHA1

    c2af6d9d553988a99bc9594e78c177af80bbe060

  • SHA256

    196226537038edf32fb5d2f4845ac60f5b0c1f80c99dc39518cca32617904b2e

  • SHA512

    869cd380f9836a5895b109daff673a6cd2b93a7b523d0fc37aaf532210da183b6c5dac2218374eda8e4a9f4f2537078acf41079df2f4d14a13c0166b3bf2d02e

Malware Config

Targets

    • Target

      196226537038edf32fb5d2f4845ac60f5b0c1f80c99dc39518cca32617904b2e

    • Size

      192KB

    • MD5

      2d5fde9ea0e4b71dcd627a5d1cccc532

    • SHA1

      c2af6d9d553988a99bc9594e78c177af80bbe060

    • SHA256

      196226537038edf32fb5d2f4845ac60f5b0c1f80c99dc39518cca32617904b2e

    • SHA512

      869cd380f9836a5895b109daff673a6cd2b93a7b523d0fc37aaf532210da183b6c5dac2218374eda8e4a9f4f2537078acf41079df2f4d14a13c0166b3bf2d02e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks