General

  • Target

    150bc2583b8549c4f3d2e44fc61e954bc3e96f76042c6d423850c547d79a7d51

  • Size

    99KB

  • Sample

    220212-e8epwagaf2

  • MD5

    322ede0568168c9c86e91624dd80ed95

  • SHA1

    6e5c2728bbcfdf239a765338bb0609d0f013f732

  • SHA256

    150bc2583b8549c4f3d2e44fc61e954bc3e96f76042c6d423850c547d79a7d51

  • SHA512

    ccfb6a9d6a2a996e6ac1929e51f4be8ca2462d44de24774f3cb5da12bfa33c480778ef06a2c1c9bfe059f176ad44659dc652da716bd8d3ee6c796fa7b7397eac

Malware Config

Targets

    • Target

      150bc2583b8549c4f3d2e44fc61e954bc3e96f76042c6d423850c547d79a7d51

    • Size

      99KB

    • MD5

      322ede0568168c9c86e91624dd80ed95

    • SHA1

      6e5c2728bbcfdf239a765338bb0609d0f013f732

    • SHA256

      150bc2583b8549c4f3d2e44fc61e954bc3e96f76042c6d423850c547d79a7d51

    • SHA512

      ccfb6a9d6a2a996e6ac1929e51f4be8ca2462d44de24774f3cb5da12bfa33c480778ef06a2c1c9bfe059f176ad44659dc652da716bd8d3ee6c796fa7b7397eac

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks