General

  • Target

    164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf

  • Size

    191KB

  • Sample

    220212-ek1bnsfgc8

  • MD5

    65d78822698d3d21c6a7b26c21b0d431

  • SHA1

    552c9a186140de92ffd0bc0e8e8243063fe92ee2

  • SHA256

    164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf

  • SHA512

    1cafea14195886ce4d5e916db8ff7b6d9a6b89e23586e099f8ac972d02cc61c6cf1fd83354d0257b4a75e0df77e4983384846d461f61ca839621fd1d5948d4de

Malware Config

Targets

    • Target

      164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf

    • Size

      191KB

    • MD5

      65d78822698d3d21c6a7b26c21b0d431

    • SHA1

      552c9a186140de92ffd0bc0e8e8243063fe92ee2

    • SHA256

      164e8c58906f4e7416d3a5549308d7ca76aca2d17aa2d8aba72a23372e61f3bf

    • SHA512

      1cafea14195886ce4d5e916db8ff7b6d9a6b89e23586e099f8ac972d02cc61c6cf1fd83354d0257b4a75e0df77e4983384846d461f61ca839621fd1d5948d4de

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks