General

  • Target

    158860c47a4f673283fb165ca0bf8ec18a7a957734604f2b2a30304b69591ce7

  • Size

    101KB

  • Sample

    220212-exekqsheaj

  • MD5

    9999978cdf1a794bf468c7032494787f

  • SHA1

    69d589d96b8ed1df23c0c38e3c05055eb7ad7b22

  • SHA256

    158860c47a4f673283fb165ca0bf8ec18a7a957734604f2b2a30304b69591ce7

  • SHA512

    3b7bdbfc61b3cdc23c6b400b782588d6f9aff2c38d6b2b5c1e409ca116274ddf548784e150b9b81a905115ac59d52d030b0247586d272665e56e9ae41fdf4b12

Malware Config

Targets

    • Target

      158860c47a4f673283fb165ca0bf8ec18a7a957734604f2b2a30304b69591ce7

    • Size

      101KB

    • MD5

      9999978cdf1a794bf468c7032494787f

    • SHA1

      69d589d96b8ed1df23c0c38e3c05055eb7ad7b22

    • SHA256

      158860c47a4f673283fb165ca0bf8ec18a7a957734604f2b2a30304b69591ce7

    • SHA512

      3b7bdbfc61b3cdc23c6b400b782588d6f9aff2c38d6b2b5c1e409ca116274ddf548784e150b9b81a905115ac59d52d030b0247586d272665e56e9ae41fdf4b12

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks