General

  • Target

    179ab139dc128b795997aa0329a35a658b8b4994119aa6d30d2fd5973420681d

  • Size

    191KB

  • Sample

    220212-dzzs1sfdh2

  • MD5

    797c998b353456449c3b22fdf1b729cf

  • SHA1

    0318ac93c2cb82cbd3ad36df8558c5aab282fb7b

  • SHA256

    179ab139dc128b795997aa0329a35a658b8b4994119aa6d30d2fd5973420681d

  • SHA512

    a2376c4d94197bc36e6a2323aa85eda92c7c8e4a0143c536fe9e6e036ba044b60b277b0dd65df65435944211c70e009e7c5860ad1f016551f5a883802470edb6

Malware Config

Targets

    • Target

      179ab139dc128b795997aa0329a35a658b8b4994119aa6d30d2fd5973420681d

    • Size

      191KB

    • MD5

      797c998b353456449c3b22fdf1b729cf

    • SHA1

      0318ac93c2cb82cbd3ad36df8558c5aab282fb7b

    • SHA256

      179ab139dc128b795997aa0329a35a658b8b4994119aa6d30d2fd5973420681d

    • SHA512

      a2376c4d94197bc36e6a2323aa85eda92c7c8e4a0143c536fe9e6e036ba044b60b277b0dd65df65435944211c70e009e7c5860ad1f016551f5a883802470edb6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks