General

  • Target

    1662a9b353d1111a9a6016c9e0a3204154111fd1bd6c55646fc388254d86b133

  • Size

    101KB

  • Sample

    220212-eh4w3shccp

  • MD5

    d299bb8734f105209b520eee341023d4

  • SHA1

    0bedd62d799bc9371d63dce5d506d1e71385863c

  • SHA256

    1662a9b353d1111a9a6016c9e0a3204154111fd1bd6c55646fc388254d86b133

  • SHA512

    7bff082162fcd774d3b91d1a4074d6a5e953b91d07cdb991693929e585b9726980cab5209e9e67630959e291cd3c892abd39395aa051f02ae43df23a9c428245

Malware Config

Targets

    • Target

      1662a9b353d1111a9a6016c9e0a3204154111fd1bd6c55646fc388254d86b133

    • Size

      101KB

    • MD5

      d299bb8734f105209b520eee341023d4

    • SHA1

      0bedd62d799bc9371d63dce5d506d1e71385863c

    • SHA256

      1662a9b353d1111a9a6016c9e0a3204154111fd1bd6c55646fc388254d86b133

    • SHA512

      7bff082162fcd774d3b91d1a4074d6a5e953b91d07cdb991693929e585b9726980cab5209e9e67630959e291cd3c892abd39395aa051f02ae43df23a9c428245

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks