General

  • Target

    1871c11fcf3f32f57f1055c70fae125dc811a302cf55dc3b66d7a630f60116a0

  • Size

    192KB

  • Sample

    220212-dnt4dsfcf3

  • MD5

    63b1b9b13a0410e570b15ff8a6212798

  • SHA1

    2fef29fe0892551ddde18d85bc36a0b15dd6ae9f

  • SHA256

    1871c11fcf3f32f57f1055c70fae125dc811a302cf55dc3b66d7a630f60116a0

  • SHA512

    cb2ddae05ed748926918edbb1204c50aed358b8fcebd5c24170925147b4f4ea95e7a3f910f9ddf84120c9ee3e217877c105e9dcf02a12ecfb76e525974b27c41

Malware Config

Targets

    • Target

      1871c11fcf3f32f57f1055c70fae125dc811a302cf55dc3b66d7a630f60116a0

    • Size

      192KB

    • MD5

      63b1b9b13a0410e570b15ff8a6212798

    • SHA1

      2fef29fe0892551ddde18d85bc36a0b15dd6ae9f

    • SHA256

      1871c11fcf3f32f57f1055c70fae125dc811a302cf55dc3b66d7a630f60116a0

    • SHA512

      cb2ddae05ed748926918edbb1204c50aed358b8fcebd5c24170925147b4f4ea95e7a3f910f9ddf84120c9ee3e217877c105e9dcf02a12ecfb76e525974b27c41

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks