General

  • Target

    1543cea669e53bce569976a00d87e3ada4b6fff7719631f29e633a263f4e4368

  • Size

    192KB

  • Sample

    220212-e29xfagac4

  • MD5

    f249c24e33fdd1745bdb41aae5cb2657

  • SHA1

    1b56dd33eccab893d87f817fa75bcea3b5ad4c58

  • SHA256

    1543cea669e53bce569976a00d87e3ada4b6fff7719631f29e633a263f4e4368

  • SHA512

    36861b538c6a2c75288b7e18f826507b06fa535382e47f5aee5acd300786455f466a3f058ceda45cc4b3e3b2f9f446515769c1befbcea773e50ddae961b85c55

Malware Config

Targets

    • Target

      1543cea669e53bce569976a00d87e3ada4b6fff7719631f29e633a263f4e4368

    • Size

      192KB

    • MD5

      f249c24e33fdd1745bdb41aae5cb2657

    • SHA1

      1b56dd33eccab893d87f817fa75bcea3b5ad4c58

    • SHA256

      1543cea669e53bce569976a00d87e3ada4b6fff7719631f29e633a263f4e4368

    • SHA512

      36861b538c6a2c75288b7e18f826507b06fa535382e47f5aee5acd300786455f466a3f058ceda45cc4b3e3b2f9f446515769c1befbcea773e50ddae961b85c55

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks