General

  • Target

    19052d8cd862fa403ad98605c9319537a0ba35e04a346ef86fa526c4e2cc697a

  • Size

    79KB

  • Sample

    220212-de4apsggaj

  • MD5

    05cc67597bb3dc1f9963179a679c50a6

  • SHA1

    f97de72a66d5186c8b1eefb1cdb171f3a00cfd9f

  • SHA256

    19052d8cd862fa403ad98605c9319537a0ba35e04a346ef86fa526c4e2cc697a

  • SHA512

    5fd57516257a17c236ff478b56560767e12f18e8b1a3c7484dae7618217997e8f0281afab04870eb0c454c955cc74a57faccd7e288dd1111e535121e03e35994

Malware Config

Targets

    • Target

      19052d8cd862fa403ad98605c9319537a0ba35e04a346ef86fa526c4e2cc697a

    • Size

      79KB

    • MD5

      05cc67597bb3dc1f9963179a679c50a6

    • SHA1

      f97de72a66d5186c8b1eefb1cdb171f3a00cfd9f

    • SHA256

      19052d8cd862fa403ad98605c9319537a0ba35e04a346ef86fa526c4e2cc697a

    • SHA512

      5fd57516257a17c236ff478b56560767e12f18e8b1a3c7484dae7618217997e8f0281afab04870eb0c454c955cc74a57faccd7e288dd1111e535121e03e35994

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks