General

  • Target

    167a3009ac746365bdfde005e1a473a149918a206838cfb0f8a01b5f261716e9

  • Size

    216KB

  • Sample

    220212-eg3bvsffh7

  • MD5

    2401c468b92190e929083fda8cdfff0a

  • SHA1

    2a2d897ad451c4a7c7e4650e2ee251af66ae86bc

  • SHA256

    167a3009ac746365bdfde005e1a473a149918a206838cfb0f8a01b5f261716e9

  • SHA512

    7e1cebb52f2e846acf4a8fc247194c54e75ea109eff3c75ec6c8789677f7508371bc9ed7ac06cd9a71b4601abfc8a2cdbe1586de090b04e72bdeb0263cff1d52

Malware Config

Targets

    • Target

      167a3009ac746365bdfde005e1a473a149918a206838cfb0f8a01b5f261716e9

    • Size

      216KB

    • MD5

      2401c468b92190e929083fda8cdfff0a

    • SHA1

      2a2d897ad451c4a7c7e4650e2ee251af66ae86bc

    • SHA256

      167a3009ac746365bdfde005e1a473a149918a206838cfb0f8a01b5f261716e9

    • SHA512

      7e1cebb52f2e846acf4a8fc247194c54e75ea109eff3c75ec6c8789677f7508371bc9ed7ac06cd9a71b4601abfc8a2cdbe1586de090b04e72bdeb0263cff1d52

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks