General

  • Target

    1680266c16d65bcf6751ad8f58f7a657d51469ac054a1f5152ba6dba2cc612ba

  • Size

    192KB

  • Sample

    220212-egqytshcbp

  • MD5

    e1d75b1bf47a396474ac618aa2504d71

  • SHA1

    e111864710bd0f2d0dff921edb4fde0705ee753e

  • SHA256

    1680266c16d65bcf6751ad8f58f7a657d51469ac054a1f5152ba6dba2cc612ba

  • SHA512

    a912f385c8780bb09d61b4fd336de852dd5fc041e202bb9cb20d5d8591d29ab2c8614c449098dd4029b3356a5c66c202013297d3788313329eed3cc10450b5b6

Malware Config

Targets

    • Target

      1680266c16d65bcf6751ad8f58f7a657d51469ac054a1f5152ba6dba2cc612ba

    • Size

      192KB

    • MD5

      e1d75b1bf47a396474ac618aa2504d71

    • SHA1

      e111864710bd0f2d0dff921edb4fde0705ee753e

    • SHA256

      1680266c16d65bcf6751ad8f58f7a657d51469ac054a1f5152ba6dba2cc612ba

    • SHA512

      a912f385c8780bb09d61b4fd336de852dd5fc041e202bb9cb20d5d8591d29ab2c8614c449098dd4029b3356a5c66c202013297d3788313329eed3cc10450b5b6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks