General

  • Target

    18a2110951a4bb5bdaacfee3d31c7dfabded4545d38a225f092dd10ab2cd3710

  • Size

    99KB

  • Sample

    220212-dlb5ssfcc4

  • MD5

    4f10578218af901d1d5e7c3b07c54435

  • SHA1

    8ac0121208dd1cae7161ff2817f03f1139b385f4

  • SHA256

    18a2110951a4bb5bdaacfee3d31c7dfabded4545d38a225f092dd10ab2cd3710

  • SHA512

    99148485e452103cb863198d9181afb53989f4d1e0460d6f88100a0df64837da87d754b41465dd1548d9198a871665157631f637dc007abe730a7b637cfb1c98

Malware Config

Targets

    • Target

      18a2110951a4bb5bdaacfee3d31c7dfabded4545d38a225f092dd10ab2cd3710

    • Size

      99KB

    • MD5

      4f10578218af901d1d5e7c3b07c54435

    • SHA1

      8ac0121208dd1cae7161ff2817f03f1139b385f4

    • SHA256

      18a2110951a4bb5bdaacfee3d31c7dfabded4545d38a225f092dd10ab2cd3710

    • SHA512

      99148485e452103cb863198d9181afb53989f4d1e0460d6f88100a0df64837da87d754b41465dd1548d9198a871665157631f637dc007abe730a7b637cfb1c98

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks