General

  • Target

    193a7c7bf0f7e391a475cb8c140bef03277bf27a42fdfb360d235abfc2134a21

  • Size

    35KB

  • Sample

    220212-dcxedafbd2

  • MD5

    549f5ca9b045d2553abb96a0d00a802f

  • SHA1

    85c7f4d663bd0cacadf7970ea67547084db7edfc

  • SHA256

    193a7c7bf0f7e391a475cb8c140bef03277bf27a42fdfb360d235abfc2134a21

  • SHA512

    ea12e296c68e42b6d640dd8fc7070afa3619619b0a7a6c72ee8c59491e3ebe94335d90c5e8e70d8b139cfdecda20a310babefb376d7e6b079583d8fd509a3092

Malware Config

Targets

    • Target

      193a7c7bf0f7e391a475cb8c140bef03277bf27a42fdfb360d235abfc2134a21

    • Size

      35KB

    • MD5

      549f5ca9b045d2553abb96a0d00a802f

    • SHA1

      85c7f4d663bd0cacadf7970ea67547084db7edfc

    • SHA256

      193a7c7bf0f7e391a475cb8c140bef03277bf27a42fdfb360d235abfc2134a21

    • SHA512

      ea12e296c68e42b6d640dd8fc7070afa3619619b0a7a6c72ee8c59491e3ebe94335d90c5e8e70d8b139cfdecda20a310babefb376d7e6b079583d8fd509a3092

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks