General

  • Target

    165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882

  • Size

    150KB

  • Sample

    220212-eknymsfgc3

  • MD5

    1b362b69d4aaa0407276b9da5bcfe885

  • SHA1

    42f2551911cb27b74d08b2ed2afeeb84e0365dbf

  • SHA256

    165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882

  • SHA512

    e3d26337d522743a856d2dc12a700b6ecb2a3224f51e3c6cdcb15709f6c42751b54418f6a9e6bf3d8311e3737f66513109599061eaa059912c7bb74067f4bfad

Malware Config

Targets

    • Target

      165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882

    • Size

      150KB

    • MD5

      1b362b69d4aaa0407276b9da5bcfe885

    • SHA1

      42f2551911cb27b74d08b2ed2afeeb84e0365dbf

    • SHA256

      165117aaec0d4e4bad014a148f1802f8d0d3332f067c4f6de67251c6fbb5b882

    • SHA512

      e3d26337d522743a856d2dc12a700b6ecb2a3224f51e3c6cdcb15709f6c42751b54418f6a9e6bf3d8311e3737f66513109599061eaa059912c7bb74067f4bfad

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks