General

  • Target

    18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335

  • Size

    192KB

  • Sample

    220212-dktnfsfcb8

  • MD5

    b5b2c4d0ac62bec199cb28bd261040a2

  • SHA1

    a2d40d1ce439828bd6086a1938b475b0deef16d7

  • SHA256

    18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335

  • SHA512

    763133812230ba19d27a2cd92538117ff57a1c714184e868798dc5f7c67013163f1d2a9735ade755829e5e7baa7d4099a0f0cc801508081d8ef4f334cf5fa8eb

Malware Config

Targets

    • Target

      18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335

    • Size

      192KB

    • MD5

      b5b2c4d0ac62bec199cb28bd261040a2

    • SHA1

      a2d40d1ce439828bd6086a1938b475b0deef16d7

    • SHA256

      18ae5071dfd38688d7fa230c6757ae0e6a503f44d99b5f20dd6c7c553915e335

    • SHA512

      763133812230ba19d27a2cd92538117ff57a1c714184e868798dc5f7c67013163f1d2a9735ade755829e5e7baa7d4099a0f0cc801508081d8ef4f334cf5fa8eb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks