General

  • Target

    18efee06028dfd78b6138b93391ac8f44217b6a5d3547215fe987444be5659f6

  • Size

    101KB

  • Sample

    220212-df9twaggar

  • MD5

    585430aae2cc2a93cae70429c7298c0a

  • SHA1

    3bc07f084cf8a7d1b344b5f7eb35c3a081022f4d

  • SHA256

    18efee06028dfd78b6138b93391ac8f44217b6a5d3547215fe987444be5659f6

  • SHA512

    664f49a6ca1743f13e8aca20274a077289d686268de686ec48cac0f7831a690fe64ffd82c85cd3f0cc1dca2d099dd770dcc89d05118a2063186d134875c5270f

Malware Config

Targets

    • Target

      18efee06028dfd78b6138b93391ac8f44217b6a5d3547215fe987444be5659f6

    • Size

      101KB

    • MD5

      585430aae2cc2a93cae70429c7298c0a

    • SHA1

      3bc07f084cf8a7d1b344b5f7eb35c3a081022f4d

    • SHA256

      18efee06028dfd78b6138b93391ac8f44217b6a5d3547215fe987444be5659f6

    • SHA512

      664f49a6ca1743f13e8aca20274a077289d686268de686ec48cac0f7831a690fe64ffd82c85cd3f0cc1dca2d099dd770dcc89d05118a2063186d134875c5270f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks