General

  • Target

    179b0f78c55488f9d942d61b4273ed949fa0fce7479e4a281732c92a77e30b71

  • Size

    216KB

  • Sample

    220212-dzt8jafdg8

  • MD5

    f0e9e8c0758a3685216e0444064c4221

  • SHA1

    569c77c2697041f0a8264308890b050d4e53ec04

  • SHA256

    179b0f78c55488f9d942d61b4273ed949fa0fce7479e4a281732c92a77e30b71

  • SHA512

    18f76f7841dd47e8af4e08952e2ed8b8564b1235c01b44fd7ada1530e193e634de7261bb4744ad69c5539be9017466305d7aa28ca8d73a47ff9117bfefc612b5

Malware Config

Targets

    • Target

      179b0f78c55488f9d942d61b4273ed949fa0fce7479e4a281732c92a77e30b71

    • Size

      216KB

    • MD5

      f0e9e8c0758a3685216e0444064c4221

    • SHA1

      569c77c2697041f0a8264308890b050d4e53ec04

    • SHA256

      179b0f78c55488f9d942d61b4273ed949fa0fce7479e4a281732c92a77e30b71

    • SHA512

      18f76f7841dd47e8af4e08952e2ed8b8564b1235c01b44fd7ada1530e193e634de7261bb4744ad69c5539be9017466305d7aa28ca8d73a47ff9117bfefc612b5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks