General

  • Target

    187aabfc7cef47823902359ee8106196c3a96328e63720117a007f62f257ce95

  • Size

    150KB

  • Sample

    220212-dmzbqafce5

  • MD5

    6f08b414896dfee0ac9361e9ad9a9862

  • SHA1

    60c126b8d0b59c49cd69a6594bcd64486143e713

  • SHA256

    187aabfc7cef47823902359ee8106196c3a96328e63720117a007f62f257ce95

  • SHA512

    3731ab86e4d50f731bf2a75187d5ffb898a6fa2413e178211dbc32b1113cb89d36ad7f516d18499ca97c56c85cd2df4ad00ea8bfabddfacabdd9c817b30f51af

Malware Config

Targets

    • Target

      187aabfc7cef47823902359ee8106196c3a96328e63720117a007f62f257ce95

    • Size

      150KB

    • MD5

      6f08b414896dfee0ac9361e9ad9a9862

    • SHA1

      60c126b8d0b59c49cd69a6594bcd64486143e713

    • SHA256

      187aabfc7cef47823902359ee8106196c3a96328e63720117a007f62f257ce95

    • SHA512

      3731ab86e4d50f731bf2a75187d5ffb898a6fa2413e178211dbc32b1113cb89d36ad7f516d18499ca97c56c85cd2df4ad00ea8bfabddfacabdd9c817b30f51af

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks