General

  • Target

    1898a0fb93b22dc2f9fbac5178283fe47e828189359f8247691b29f2aae1bc94

  • Size

    100KB

  • Sample

    220212-dlk3psfcc7

  • MD5

    d3b4a936517625d7bcfbf83c8c23c369

  • SHA1

    ecd4bb20c9de0f49f9ff0f97395183b8507c0781

  • SHA256

    1898a0fb93b22dc2f9fbac5178283fe47e828189359f8247691b29f2aae1bc94

  • SHA512

    e6bcef338928f6dfc2d07fc05ad415ae8118ca7ee1011232b8a33513b5b8dc7ed067555787e67b8b6dbe04527a4d67af1e045f0e9b3137b94f17c56dbf61e146

Malware Config

Targets

    • Target

      1898a0fb93b22dc2f9fbac5178283fe47e828189359f8247691b29f2aae1bc94

    • Size

      100KB

    • MD5

      d3b4a936517625d7bcfbf83c8c23c369

    • SHA1

      ecd4bb20c9de0f49f9ff0f97395183b8507c0781

    • SHA256

      1898a0fb93b22dc2f9fbac5178283fe47e828189359f8247691b29f2aae1bc94

    • SHA512

      e6bcef338928f6dfc2d07fc05ad415ae8118ca7ee1011232b8a33513b5b8dc7ed067555787e67b8b6dbe04527a4d67af1e045f0e9b3137b94f17c56dbf61e146

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks