General

  • Target

    18853782a49e124910d860f0391baa7e1eff8970781f6ffaf6daa887f540b8a6

  • Size

    150KB

  • Sample

    220212-dmfjlsfcd8

  • MD5

    585afb769d944c5d4876781d803ea8aa

  • SHA1

    8011597c7983f954af5869c06e760d3e2cc603b1

  • SHA256

    18853782a49e124910d860f0391baa7e1eff8970781f6ffaf6daa887f540b8a6

  • SHA512

    dd1f8d951360fc6b0a15126bd77bf6c2882d7a3871364f46fd93154ae81a6e43e4dfa3832dcdfbd6e59117a80998badd7e302ed3c39482f3d843096072c581d5

Malware Config

Targets

    • Target

      18853782a49e124910d860f0391baa7e1eff8970781f6ffaf6daa887f540b8a6

    • Size

      150KB

    • MD5

      585afb769d944c5d4876781d803ea8aa

    • SHA1

      8011597c7983f954af5869c06e760d3e2cc603b1

    • SHA256

      18853782a49e124910d860f0391baa7e1eff8970781f6ffaf6daa887f540b8a6

    • SHA512

      dd1f8d951360fc6b0a15126bd77bf6c2882d7a3871364f46fd93154ae81a6e43e4dfa3832dcdfbd6e59117a80998badd7e302ed3c39482f3d843096072c581d5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks