General

  • Target

    18b6bdf592dfe139db45d4bb4b101d1541eb24661bdb484fa142cfe871d7d3cc

  • Size

    192KB

  • Sample

    220212-dj2yfafcb2

  • MD5

    9a1da133d53e004cc748fbb33d04998f

  • SHA1

    49dd1e3e7ff1ac18829e83cc0f95f8eac2f7bbb2

  • SHA256

    18b6bdf592dfe139db45d4bb4b101d1541eb24661bdb484fa142cfe871d7d3cc

  • SHA512

    e8932e53841ef3bfeca43bbe84ee0271b17bf4dcedbd495699e4e2f2f0d490289b17eed7ea5c209119b41eff55ffc3bceed5c9ac86f4c936aa8661fb4db1e2b9

Malware Config

Targets

    • Target

      18b6bdf592dfe139db45d4bb4b101d1541eb24661bdb484fa142cfe871d7d3cc

    • Size

      192KB

    • MD5

      9a1da133d53e004cc748fbb33d04998f

    • SHA1

      49dd1e3e7ff1ac18829e83cc0f95f8eac2f7bbb2

    • SHA256

      18b6bdf592dfe139db45d4bb4b101d1541eb24661bdb484fa142cfe871d7d3cc

    • SHA512

      e8932e53841ef3bfeca43bbe84ee0271b17bf4dcedbd495699e4e2f2f0d490289b17eed7ea5c209119b41eff55ffc3bceed5c9ac86f4c936aa8661fb4db1e2b9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks