General

  • Target

    183be9177d8a2b524a9ad6d5232a235dd8373f23c1d40119880da96435457ea4

  • Size

    216KB

  • Sample

    220212-dr2bwafda4

  • MD5

    f36700142a35f7561561f68872e8d923

  • SHA1

    ad7cf346d728919e8480d2659034dea1d1a04b4b

  • SHA256

    183be9177d8a2b524a9ad6d5232a235dd8373f23c1d40119880da96435457ea4

  • SHA512

    b0ea08183d807a170ab66ce27c71b71568e547433e636135c505156a27e84bbfc5cc33f1c2459805e07523f5de0f22f98d88430104e97606caf1fb3d71c21c8d

Malware Config

Targets

    • Target

      183be9177d8a2b524a9ad6d5232a235dd8373f23c1d40119880da96435457ea4

    • Size

      216KB

    • MD5

      f36700142a35f7561561f68872e8d923

    • SHA1

      ad7cf346d728919e8480d2659034dea1d1a04b4b

    • SHA256

      183be9177d8a2b524a9ad6d5232a235dd8373f23c1d40119880da96435457ea4

    • SHA512

      b0ea08183d807a170ab66ce27c71b71568e547433e636135c505156a27e84bbfc5cc33f1c2459805e07523f5de0f22f98d88430104e97606caf1fb3d71c21c8d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks