General

  • Target

    18d78c90b9fd592ee4a0706f558512d690ac7dd4d3cfb57d334858e551081cd3

  • Size

    192KB

  • Sample

    220212-dhg7msggcn

  • MD5

    7228fc799443290e65f6eebde2bebdc0

  • SHA1

    f00b39c296c37f38ade05075b9f1f1795d665e93

  • SHA256

    18d78c90b9fd592ee4a0706f558512d690ac7dd4d3cfb57d334858e551081cd3

  • SHA512

    9026e3264a29f42b781480b5dcffe23d099c42b0c15c276f2592e64394283f14d038b843aed1df7381ede512ef237e80b1770994bbe19c3cb74bc23d3c6098b0

Malware Config

Targets

    • Target

      18d78c90b9fd592ee4a0706f558512d690ac7dd4d3cfb57d334858e551081cd3

    • Size

      192KB

    • MD5

      7228fc799443290e65f6eebde2bebdc0

    • SHA1

      f00b39c296c37f38ade05075b9f1f1795d665e93

    • SHA256

      18d78c90b9fd592ee4a0706f558512d690ac7dd4d3cfb57d334858e551081cd3

    • SHA512

      9026e3264a29f42b781480b5dcffe23d099c42b0c15c276f2592e64394283f14d038b843aed1df7381ede512ef237e80b1770994bbe19c3cb74bc23d3c6098b0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks