General

  • Target

    18b3eb5679c447691b85a5aeda46c6fe56c72d9f3e1d2bce1386cadf93638e32

  • Size

    192KB

  • Sample

    220212-dkdbgafcb6

  • MD5

    25f3bcd45f14f7130dd5bafa329b876e

  • SHA1

    7a2281175d79c80dd4b251cd2ba4646e9dda4588

  • SHA256

    18b3eb5679c447691b85a5aeda46c6fe56c72d9f3e1d2bce1386cadf93638e32

  • SHA512

    99a89af4088d72ec2aee87d13415ee294301f1c42ac39e9106bfd7908314bebe7ce475a467c96e0446cab8f8dd99bd35dd881036d023c6b877eac36d5c457a73

Malware Config

Targets

    • Target

      18b3eb5679c447691b85a5aeda46c6fe56c72d9f3e1d2bce1386cadf93638e32

    • Size

      192KB

    • MD5

      25f3bcd45f14f7130dd5bafa329b876e

    • SHA1

      7a2281175d79c80dd4b251cd2ba4646e9dda4588

    • SHA256

      18b3eb5679c447691b85a5aeda46c6fe56c72d9f3e1d2bce1386cadf93638e32

    • SHA512

      99a89af4088d72ec2aee87d13415ee294301f1c42ac39e9106bfd7908314bebe7ce475a467c96e0446cab8f8dd99bd35dd881036d023c6b877eac36d5c457a73

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks