General

  • Target

    183ffedf8d1cbe414ebdbc6dc546cdbf0285ee289a784a9ecb694934ae4078e6

  • Size

    99KB

  • Sample

    220212-drrsfaghcn

  • MD5

    5965902257abe4225f4b84237065fcae

  • SHA1

    336e7e010d775bd47c2f40a45187f7126c1f48c3

  • SHA256

    183ffedf8d1cbe414ebdbc6dc546cdbf0285ee289a784a9ecb694934ae4078e6

  • SHA512

    0abb06fd084b7b09b2ead9e4f8ed7b178d9474701b873f18621ee48661722518a2bbd9029f9dd145fe8fdc920d3069b58a16725b422d1bf84b1d31e57a7c1670

Malware Config

Targets

    • Target

      183ffedf8d1cbe414ebdbc6dc546cdbf0285ee289a784a9ecb694934ae4078e6

    • Size

      99KB

    • MD5

      5965902257abe4225f4b84237065fcae

    • SHA1

      336e7e010d775bd47c2f40a45187f7126c1f48c3

    • SHA256

      183ffedf8d1cbe414ebdbc6dc546cdbf0285ee289a784a9ecb694934ae4078e6

    • SHA512

      0abb06fd084b7b09b2ead9e4f8ed7b178d9474701b873f18621ee48661722518a2bbd9029f9dd145fe8fdc920d3069b58a16725b422d1bf84b1d31e57a7c1670

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks