General

  • Target

    1605d430f551f62a6de86ee2642cdf8afdb41edb76f6154fb0cc74ff27ff5d38

  • Size

    150KB

  • Sample

    220212-epqyssfgg4

  • MD5

    1aeff85c7442d32019a583f361b4f080

  • SHA1

    a6888b1abceb90ba9208d67b84c79580cf32e0c2

  • SHA256

    1605d430f551f62a6de86ee2642cdf8afdb41edb76f6154fb0cc74ff27ff5d38

  • SHA512

    6a2856044b4d92ac488474e19943dd2f9b539e1a5b75eb2aa388c854b361dbda3b43dbe96de0090324c5a2623e9e334a04ae5a4de3da1020678373d2c7ddd90b

Malware Config

Targets

    • Target

      1605d430f551f62a6de86ee2642cdf8afdb41edb76f6154fb0cc74ff27ff5d38

    • Size

      150KB

    • MD5

      1aeff85c7442d32019a583f361b4f080

    • SHA1

      a6888b1abceb90ba9208d67b84c79580cf32e0c2

    • SHA256

      1605d430f551f62a6de86ee2642cdf8afdb41edb76f6154fb0cc74ff27ff5d38

    • SHA512

      6a2856044b4d92ac488474e19943dd2f9b539e1a5b75eb2aa388c854b361dbda3b43dbe96de0090324c5a2623e9e334a04ae5a4de3da1020678373d2c7ddd90b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks