General

  • Target

    15ad29cf58a63b4e32dd4244e7c92569eb826826df451d0481efea72f52b7911

  • Size

    212KB

  • Sample

    220212-evlw2afhd4

  • MD5

    7bbf76dd54f96bb17f9bfb90fbfdc21f

  • SHA1

    4949df6788c290c37d0e535ee29d8014033b72b8

  • SHA256

    15ad29cf58a63b4e32dd4244e7c92569eb826826df451d0481efea72f52b7911

  • SHA512

    40497ac60e6652d148b602f2161526aef61e442d862b46b93477ee52452f4974cdbae626a020226176239e973f080b9f324ea7dd41ce720023be41dd7f70f998

Malware Config

Targets

    • Target

      15ad29cf58a63b4e32dd4244e7c92569eb826826df451d0481efea72f52b7911

    • Size

      212KB

    • MD5

      7bbf76dd54f96bb17f9bfb90fbfdc21f

    • SHA1

      4949df6788c290c37d0e535ee29d8014033b72b8

    • SHA256

      15ad29cf58a63b4e32dd4244e7c92569eb826826df451d0481efea72f52b7911

    • SHA512

      40497ac60e6652d148b602f2161526aef61e442d862b46b93477ee52452f4974cdbae626a020226176239e973f080b9f324ea7dd41ce720023be41dd7f70f998

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks