General

  • Target

    18c09def78bbe812bf15fc58755ccef4b68a45b24c1f7fd408de900898a8378b

  • Size

    144KB

  • Sample

    220212-djp9msggdq

  • MD5

    02b10c58e74a7784a842ba3b0287a124

  • SHA1

    ca6b99c1fb3e4edf7ce4db2af131d2fc4fbe0cec

  • SHA256

    18c09def78bbe812bf15fc58755ccef4b68a45b24c1f7fd408de900898a8378b

  • SHA512

    79e975b06c70ac70c6f40f5e82239bf8f92c42fa45a0ffd73bb74af5cb2a481fd5a8cd7ae1cfc95b4f69dbdd4cd3db956cc3e08da2e5a03ab27c297ebf5f641c

Malware Config

Targets

    • Target

      18c09def78bbe812bf15fc58755ccef4b68a45b24c1f7fd408de900898a8378b

    • Size

      144KB

    • MD5

      02b10c58e74a7784a842ba3b0287a124

    • SHA1

      ca6b99c1fb3e4edf7ce4db2af131d2fc4fbe0cec

    • SHA256

      18c09def78bbe812bf15fc58755ccef4b68a45b24c1f7fd408de900898a8378b

    • SHA512

      79e975b06c70ac70c6f40f5e82239bf8f92c42fa45a0ffd73bb74af5cb2a481fd5a8cd7ae1cfc95b4f69dbdd4cd3db956cc3e08da2e5a03ab27c297ebf5f641c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks