General

  • Target

    1936d84d11745c674c02cb2b82ba2924688175824c6b1f38c113c5d771d480e7

  • Size

    100KB

  • Sample

    220212-dc4hpagffq

  • MD5

    2c1205f66dc8a5c14e1d0b75b307ee4d

  • SHA1

    42be13bf1e0842a61defbb457e29379a9f0870ad

  • SHA256

    1936d84d11745c674c02cb2b82ba2924688175824c6b1f38c113c5d771d480e7

  • SHA512

    00a2b19bbd39054edd5b0bd1c6ccf1596a564714d1501b431c6aa10aedc0557a76f57a5637b2f699a2c768f79137791152422177d2837d35e57c616c94f58992

Malware Config

Targets

    • Target

      1936d84d11745c674c02cb2b82ba2924688175824c6b1f38c113c5d771d480e7

    • Size

      100KB

    • MD5

      2c1205f66dc8a5c14e1d0b75b307ee4d

    • SHA1

      42be13bf1e0842a61defbb457e29379a9f0870ad

    • SHA256

      1936d84d11745c674c02cb2b82ba2924688175824c6b1f38c113c5d771d480e7

    • SHA512

      00a2b19bbd39054edd5b0bd1c6ccf1596a564714d1501b431c6aa10aedc0557a76f57a5637b2f699a2c768f79137791152422177d2837d35e57c616c94f58992

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks