General

  • Target

    1605f9bced5293d46eedee1058cac6dee4196bbb6e85e12454af59199ad5a53c

  • Size

    216KB

  • Sample

    220212-epntfafgg3

  • MD5

    3e2e5fedb4dd64a26e12f7db941bd26c

  • SHA1

    90157a8b9a5914138e3ac2d824b46ff8aba34e9e

  • SHA256

    1605f9bced5293d46eedee1058cac6dee4196bbb6e85e12454af59199ad5a53c

  • SHA512

    d382938271e5a29ee390cea6d6e65a33d8fc7a7b798b53cb34c5ff8fcb722a615894dcaf53bf9d766698f74c0f55d0479c7914545885bde7f11f90016a44351d

Malware Config

Targets

    • Target

      1605f9bced5293d46eedee1058cac6dee4196bbb6e85e12454af59199ad5a53c

    • Size

      216KB

    • MD5

      3e2e5fedb4dd64a26e12f7db941bd26c

    • SHA1

      90157a8b9a5914138e3ac2d824b46ff8aba34e9e

    • SHA256

      1605f9bced5293d46eedee1058cac6dee4196bbb6e85e12454af59199ad5a53c

    • SHA512

      d382938271e5a29ee390cea6d6e65a33d8fc7a7b798b53cb34c5ff8fcb722a615894dcaf53bf9d766698f74c0f55d0479c7914545885bde7f11f90016a44351d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks