General

  • Target

    1675ae7b61ecf82d260ecababd2e7cef19cf562b6c95d19ef4169e89c6abe54f

  • Size

    79KB

  • Sample

    220212-eg85eafga2

  • MD5

    8d0371d07a7c96cb75280a6d370ef424

  • SHA1

    62cb6ef04073891ba50e051a93ce9fb36e4f97dd

  • SHA256

    1675ae7b61ecf82d260ecababd2e7cef19cf562b6c95d19ef4169e89c6abe54f

  • SHA512

    311184da8f7f7ee4cbde8498634b453a953892189357f522beb6ba9ad7acb8a43994e4602c238eb8bdb00032d1014fa1317e624fe423b2e825299d7fc6bc8954

Malware Config

Targets

    • Target

      1675ae7b61ecf82d260ecababd2e7cef19cf562b6c95d19ef4169e89c6abe54f

    • Size

      79KB

    • MD5

      8d0371d07a7c96cb75280a6d370ef424

    • SHA1

      62cb6ef04073891ba50e051a93ce9fb36e4f97dd

    • SHA256

      1675ae7b61ecf82d260ecababd2e7cef19cf562b6c95d19ef4169e89c6abe54f

    • SHA512

      311184da8f7f7ee4cbde8498634b453a953892189357f522beb6ba9ad7acb8a43994e4602c238eb8bdb00032d1014fa1317e624fe423b2e825299d7fc6bc8954

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks