General

  • Target

    18c1b96f4d5d2469afdb0044ccd295b3654f123571c255d0367e2274ee797124

  • Size

    101KB

  • Sample

    220212-djdwlsggdj

  • MD5

    b6ac54687eca082135b2c9db71e6052e

  • SHA1

    d9f81879fccf7dcb33c79593a1a7c44df298aa31

  • SHA256

    18c1b96f4d5d2469afdb0044ccd295b3654f123571c255d0367e2274ee797124

  • SHA512

    7bbc1ea855a2957b1be1812b5f12c02300a3334d148b98446a359d1a67c3e8d8056bf26fa2d4d97f3bc3690dac2c491e5558b714f33e1f9cf62777f5052bcc5b

Malware Config

Targets

    • Target

      18c1b96f4d5d2469afdb0044ccd295b3654f123571c255d0367e2274ee797124

    • Size

      101KB

    • MD5

      b6ac54687eca082135b2c9db71e6052e

    • SHA1

      d9f81879fccf7dcb33c79593a1a7c44df298aa31

    • SHA256

      18c1b96f4d5d2469afdb0044ccd295b3654f123571c255d0367e2274ee797124

    • SHA512

      7bbc1ea855a2957b1be1812b5f12c02300a3334d148b98446a359d1a67c3e8d8056bf26fa2d4d97f3bc3690dac2c491e5558b714f33e1f9cf62777f5052bcc5b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks