General

  • Target

    1874d82e18ef053aeac102217d8ffaaef9ef09f4ee0a61bcc3c64deedafd0d1d

  • Size

    99KB

  • Sample

    220212-dnmdjsgghl

  • MD5

    96480b4a8f136f72484ed9813e426378

  • SHA1

    f6343f34b6de09ffde9fb874aaa6c606d6a4f7b0

  • SHA256

    1874d82e18ef053aeac102217d8ffaaef9ef09f4ee0a61bcc3c64deedafd0d1d

  • SHA512

    072baf1c88fa1a969b9615e2c8547ea37ab14b1c72b10a2bec5652973153d165fa0d8a671f01ba605cc0f96fb1fa8e5d280ca8fed2519fb745dd37ba5c8996f0

Malware Config

Targets

    • Target

      1874d82e18ef053aeac102217d8ffaaef9ef09f4ee0a61bcc3c64deedafd0d1d

    • Size

      99KB

    • MD5

      96480b4a8f136f72484ed9813e426378

    • SHA1

      f6343f34b6de09ffde9fb874aaa6c606d6a4f7b0

    • SHA256

      1874d82e18ef053aeac102217d8ffaaef9ef09f4ee0a61bcc3c64deedafd0d1d

    • SHA512

      072baf1c88fa1a969b9615e2c8547ea37ab14b1c72b10a2bec5652973153d165fa0d8a671f01ba605cc0f96fb1fa8e5d280ca8fed2519fb745dd37ba5c8996f0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks