General

  • Target

    158dbd448ce17df050145cb1f51ddc901479243b2a35e0a5537783826591fe88

  • Size

    99KB

  • Sample

    220212-ew13cafhe8

  • MD5

    05031431dd97181b54ba1b33a7caf00a

  • SHA1

    26481c4ec528a27bc6d0803d7ad6dd6c10a0f667

  • SHA256

    158dbd448ce17df050145cb1f51ddc901479243b2a35e0a5537783826591fe88

  • SHA512

    c78e6e4de6ab6009ed8f2af4aae73dc0482366ad13e77ad55698d23ccd9c4b84972a89218b49712e94d1e8bc57b64362d758a8d2f04d4e301ad827f6ca852202

Malware Config

Targets

    • Target

      158dbd448ce17df050145cb1f51ddc901479243b2a35e0a5537783826591fe88

    • Size

      99KB

    • MD5

      05031431dd97181b54ba1b33a7caf00a

    • SHA1

      26481c4ec528a27bc6d0803d7ad6dd6c10a0f667

    • SHA256

      158dbd448ce17df050145cb1f51ddc901479243b2a35e0a5537783826591fe88

    • SHA512

      c78e6e4de6ab6009ed8f2af4aae73dc0482366ad13e77ad55698d23ccd9c4b84972a89218b49712e94d1e8bc57b64362d758a8d2f04d4e301ad827f6ca852202

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks