General

  • Target

    18b170a82bb113f987b3dd6d1dcfdeff06e7a7c3c4123bfbd295b63e512fa696

  • Size

    191KB

  • Sample

    220212-dkmj5sggen

  • MD5

    c5777e60b602e65366931ac794231119

  • SHA1

    e9acb7644199a84c68917d19fcdd7c3dd4ab9414

  • SHA256

    18b170a82bb113f987b3dd6d1dcfdeff06e7a7c3c4123bfbd295b63e512fa696

  • SHA512

    93f1649a562271fbb20ed1e064f394189fdfcbea97722b152c72bf791c705a5122dd7b862640a0759463c3ad1231414dcb82aad4a432f0fe587131c6d9c71c9b

Malware Config

Targets

    • Target

      18b170a82bb113f987b3dd6d1dcfdeff06e7a7c3c4123bfbd295b63e512fa696

    • Size

      191KB

    • MD5

      c5777e60b602e65366931ac794231119

    • SHA1

      e9acb7644199a84c68917d19fcdd7c3dd4ab9414

    • SHA256

      18b170a82bb113f987b3dd6d1dcfdeff06e7a7c3c4123bfbd295b63e512fa696

    • SHA512

      93f1649a562271fbb20ed1e064f394189fdfcbea97722b152c72bf791c705a5122dd7b862640a0759463c3ad1231414dcb82aad4a432f0fe587131c6d9c71c9b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks