General

  • Target

    157648200dcd197b2dcdb4524dada7f8221f5bffcfcd616f9fb5e3e859ee618c

  • Size

    176KB

  • Sample

    220212-eyw66sfhg8

  • MD5

    774de686b56edf644587f52afcab9aa2

  • SHA1

    a10df967d623249f4552db136f9b3ecde7ed89be

  • SHA256

    157648200dcd197b2dcdb4524dada7f8221f5bffcfcd616f9fb5e3e859ee618c

  • SHA512

    dbf60fc7c2826b5e56ec3aaf01ae8d85fe34db7b1bfd00cc6fb61ea17c7ac23047dd3da000a169d926af198129252b74f01812681586bcd0072b0b2bc1e83b52

Malware Config

Targets

    • Target

      157648200dcd197b2dcdb4524dada7f8221f5bffcfcd616f9fb5e3e859ee618c

    • Size

      176KB

    • MD5

      774de686b56edf644587f52afcab9aa2

    • SHA1

      a10df967d623249f4552db136f9b3ecde7ed89be

    • SHA256

      157648200dcd197b2dcdb4524dada7f8221f5bffcfcd616f9fb5e3e859ee618c

    • SHA512

      dbf60fc7c2826b5e56ec3aaf01ae8d85fe34db7b1bfd00cc6fb61ea17c7ac23047dd3da000a169d926af198129252b74f01812681586bcd0072b0b2bc1e83b52

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks