General

  • Target

    19368ab4555001619e0e661232c95cc0c017a1984681b1bbfc586690e9dd1d19

  • Size

    192KB

  • Sample

    220212-dc6m2sfbd4

  • MD5

    9eea73a82904d7d626ed874ee5e35075

  • SHA1

    9c1bd457f969ad4d4f0ceff32c3b2e87089d0ed3

  • SHA256

    19368ab4555001619e0e661232c95cc0c017a1984681b1bbfc586690e9dd1d19

  • SHA512

    6db6cf65f07afe256ea7aae2b60feeff57faca6b3d17593c55b8f95ccdb94f352c4864cdad492f0d126bab0ee28c521b97ddcc2fe5abb6313696f43aa744a63f

Malware Config

Targets

    • Target

      19368ab4555001619e0e661232c95cc0c017a1984681b1bbfc586690e9dd1d19

    • Size

      192KB

    • MD5

      9eea73a82904d7d626ed874ee5e35075

    • SHA1

      9c1bd457f969ad4d4f0ceff32c3b2e87089d0ed3

    • SHA256

      19368ab4555001619e0e661232c95cc0c017a1984681b1bbfc586690e9dd1d19

    • SHA512

      6db6cf65f07afe256ea7aae2b60feeff57faca6b3d17593c55b8f95ccdb94f352c4864cdad492f0d126bab0ee28c521b97ddcc2fe5abb6313696f43aa744a63f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks