General

  • Target

    1559b6fc5bec5d078977685a70d5054ff084c26ec5ab4e7f1349dbd3407c3cb2

  • Size

    192KB

  • Sample

    220212-e1sa1agaa8

  • MD5

    3dc8fc635531d8f97cdb43104864dee1

  • SHA1

    8f4625771536773342a6f326530305f6617d33c9

  • SHA256

    1559b6fc5bec5d078977685a70d5054ff084c26ec5ab4e7f1349dbd3407c3cb2

  • SHA512

    98eefc5dc0c0add287c18178e6ff9e63901aa693ffbb53850394a2ccbbc1bef842fe4b0c27607b3aa5a2d38865048ec6586720277f4b58303cd2249df73230a6

Malware Config

Targets

    • Target

      1559b6fc5bec5d078977685a70d5054ff084c26ec5ab4e7f1349dbd3407c3cb2

    • Size

      192KB

    • MD5

      3dc8fc635531d8f97cdb43104864dee1

    • SHA1

      8f4625771536773342a6f326530305f6617d33c9

    • SHA256

      1559b6fc5bec5d078977685a70d5054ff084c26ec5ab4e7f1349dbd3407c3cb2

    • SHA512

      98eefc5dc0c0add287c18178e6ff9e63901aa693ffbb53850394a2ccbbc1bef842fe4b0c27607b3aa5a2d38865048ec6586720277f4b58303cd2249df73230a6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks