General

  • Target

    168d48cc9afcde8ce11569ac6cde753088a9e1717b3de9ee9e58db0ab5699d2e

  • Size

    216KB

  • Sample

    220212-ef13eaffg5

  • MD5

    dde9d37e90bbe1e5b668c37c63036d93

  • SHA1

    95d0390bfafe6420e3ea29b87d1ba2507a23d7cc

  • SHA256

    168d48cc9afcde8ce11569ac6cde753088a9e1717b3de9ee9e58db0ab5699d2e

  • SHA512

    7908eaee7e8cdfc7e15ea23dfa62fb3a7e002b1828e0affb8fa285ed0a9806d14f1132ff9cbb594024ac66a206f77002da94934863108e4d1fa364da1466582b

Malware Config

Targets

    • Target

      168d48cc9afcde8ce11569ac6cde753088a9e1717b3de9ee9e58db0ab5699d2e

    • Size

      216KB

    • MD5

      dde9d37e90bbe1e5b668c37c63036d93

    • SHA1

      95d0390bfafe6420e3ea29b87d1ba2507a23d7cc

    • SHA256

      168d48cc9afcde8ce11569ac6cde753088a9e1717b3de9ee9e58db0ab5699d2e

    • SHA512

      7908eaee7e8cdfc7e15ea23dfa62fb3a7e002b1828e0affb8fa285ed0a9806d14f1132ff9cbb594024ac66a206f77002da94934863108e4d1fa364da1466582b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks