General

  • Target

    1617a841dc629d779b4a70167508576855d8962dbb895147fedf223584597b4d

  • Size

    100KB

  • Sample

    220212-enfrfahchm

  • MD5

    79983f7f5b5dbb3bf91717e17c87fbe5

  • SHA1

    75e8a7fa3adc988f4ef95333a62ed11063c954dc

  • SHA256

    1617a841dc629d779b4a70167508576855d8962dbb895147fedf223584597b4d

  • SHA512

    98e6c0f8c236868f57d6426ec29c9b1032258ca41b99f2630457be2799c9cb0d2dfa39f4c3baeccfbb7eaa4d1717623fc2b1f1aa3f34bf4f6aed99ef1be443b9

Malware Config

Targets

    • Target

      1617a841dc629d779b4a70167508576855d8962dbb895147fedf223584597b4d

    • Size

      100KB

    • MD5

      79983f7f5b5dbb3bf91717e17c87fbe5

    • SHA1

      75e8a7fa3adc988f4ef95333a62ed11063c954dc

    • SHA256

      1617a841dc629d779b4a70167508576855d8962dbb895147fedf223584597b4d

    • SHA512

      98e6c0f8c236868f57d6426ec29c9b1032258ca41b99f2630457be2799c9cb0d2dfa39f4c3baeccfbb7eaa4d1717623fc2b1f1aa3f34bf4f6aed99ef1be443b9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks