General

  • Target

    165e613bcc3a92679cc39e8306cf5b538bd768d17542421472ad6109eaa6dc0f

  • Size

    216KB

  • Sample

    220212-ejmn7afgb4

  • MD5

    78b67f07ac4716a856a748c892c665c8

  • SHA1

    d42b89de04dcc7693c093edb02633eccb2bae3bc

  • SHA256

    165e613bcc3a92679cc39e8306cf5b538bd768d17542421472ad6109eaa6dc0f

  • SHA512

    85b8e9688ad07f39c90fd85e84a79277eacd9ef39069c2026e8ee1253597e8b24f0301d0995b2751dcf18457e83e38a5cb7773ff31a6b2bc6f2add98b05a0787

Malware Config

Targets

    • Target

      165e613bcc3a92679cc39e8306cf5b538bd768d17542421472ad6109eaa6dc0f

    • Size

      216KB

    • MD5

      78b67f07ac4716a856a748c892c665c8

    • SHA1

      d42b89de04dcc7693c093edb02633eccb2bae3bc

    • SHA256

      165e613bcc3a92679cc39e8306cf5b538bd768d17542421472ad6109eaa6dc0f

    • SHA512

      85b8e9688ad07f39c90fd85e84a79277eacd9ef39069c2026e8ee1253597e8b24f0301d0995b2751dcf18457e83e38a5cb7773ff31a6b2bc6f2add98b05a0787

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks