General

  • Target

    153b52dbfd728c09df9c483178b1549e6bc0b202505acc42d8fdacbe74be4dfe

  • Size

    216KB

  • Sample

    220212-e58hsagad2

  • MD5

    a7a0846bcc931c530f8467d46ee26c97

  • SHA1

    66c03a0edb1fbb446c600b01ebfc6669ae8d7a01

  • SHA256

    153b52dbfd728c09df9c483178b1549e6bc0b202505acc42d8fdacbe74be4dfe

  • SHA512

    6eb53bac4e8c936f0b5548ef5c08739a6d4f4bf83bd5662e6b6d87cdf0f7226d4ee01d993d901487875d95d2ce0570c781845520bf94a3867b195cb4336f6ce1

Malware Config

Targets

    • Target

      153b52dbfd728c09df9c483178b1549e6bc0b202505acc42d8fdacbe74be4dfe

    • Size

      216KB

    • MD5

      a7a0846bcc931c530f8467d46ee26c97

    • SHA1

      66c03a0edb1fbb446c600b01ebfc6669ae8d7a01

    • SHA256

      153b52dbfd728c09df9c483178b1549e6bc0b202505acc42d8fdacbe74be4dfe

    • SHA512

      6eb53bac4e8c936f0b5548ef5c08739a6d4f4bf83bd5662e6b6d87cdf0f7226d4ee01d993d901487875d95d2ce0570c781845520bf94a3867b195cb4336f6ce1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks