General

  • Target

    1534d6e283c5ed53aa26c4afec91ebfc40b5a965a3e63b81c4f3423358c86955

  • Size

    192KB

  • Sample

    220212-e6jwtagad7

  • MD5

    1b58ba30770a90f40326deb6acb5e326

  • SHA1

    9aeb9e6781b0d02da4fa01e075ee8c65411b1979

  • SHA256

    1534d6e283c5ed53aa26c4afec91ebfc40b5a965a3e63b81c4f3423358c86955

  • SHA512

    9c255a052b48f5494e5a54defb7d0cfc87e9761a702855067cbc9760364671383d4cce4aae47f75337f368c23214474e7ae4f3d7d4e0b106da1122172345537c

Malware Config

Targets

    • Target

      1534d6e283c5ed53aa26c4afec91ebfc40b5a965a3e63b81c4f3423358c86955

    • Size

      192KB

    • MD5

      1b58ba30770a90f40326deb6acb5e326

    • SHA1

      9aeb9e6781b0d02da4fa01e075ee8c65411b1979

    • SHA256

      1534d6e283c5ed53aa26c4afec91ebfc40b5a965a3e63b81c4f3423358c86955

    • SHA512

      9c255a052b48f5494e5a54defb7d0cfc87e9761a702855067cbc9760364671383d4cce4aae47f75337f368c23214474e7ae4f3d7d4e0b106da1122172345537c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks