General

  • Target

    1607bf258910a50dd943fdcf9fc823e59f3daaa70af9287af70c1f95c1c164fb

  • Size

    80KB

  • Sample

    220212-epjvgshdaq

  • MD5

    f7fd7e9ab1d5dccc7a80331701805d3a

  • SHA1

    ec43d5e19b53b3308e3c613e13e831b5c56052e2

  • SHA256

    1607bf258910a50dd943fdcf9fc823e59f3daaa70af9287af70c1f95c1c164fb

  • SHA512

    a40fb9914ec774df775d2bcac75ff956dcc1c90a5c50d883041089002c1f083eae84bf25596320659d64e524749cf8508b27ada2b002468d3320feae8e0dfbf6

Malware Config

Targets

    • Target

      1607bf258910a50dd943fdcf9fc823e59f3daaa70af9287af70c1f95c1c164fb

    • Size

      80KB

    • MD5

      f7fd7e9ab1d5dccc7a80331701805d3a

    • SHA1

      ec43d5e19b53b3308e3c613e13e831b5c56052e2

    • SHA256

      1607bf258910a50dd943fdcf9fc823e59f3daaa70af9287af70c1f95c1c164fb

    • SHA512

      a40fb9914ec774df775d2bcac75ff956dcc1c90a5c50d883041089002c1f083eae84bf25596320659d64e524749cf8508b27ada2b002468d3320feae8e0dfbf6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks