General

  • Target

    156c35ee9586dcde1040c6b5c5c71a30e39f776a73e1a99cabfb754b14494a3b

  • Size

    216KB

  • Sample

    220212-ezgg4sfhh6

  • MD5

    ecb2a06d0762f82c55769cb18327f240

  • SHA1

    84d3928c5e00ce953025b1ecb2506c2e446c526b

  • SHA256

    156c35ee9586dcde1040c6b5c5c71a30e39f776a73e1a99cabfb754b14494a3b

  • SHA512

    f2e3e0e2eda203567d01d17db1cb144fbfee4b9ca9e1ce8c3aabbd008876767cd18a78ef7226c872a66b638abe524e087b6bffa57abfdb72026274e5bf3643c8

Malware Config

Targets

    • Target

      156c35ee9586dcde1040c6b5c5c71a30e39f776a73e1a99cabfb754b14494a3b

    • Size

      216KB

    • MD5

      ecb2a06d0762f82c55769cb18327f240

    • SHA1

      84d3928c5e00ce953025b1ecb2506c2e446c526b

    • SHA256

      156c35ee9586dcde1040c6b5c5c71a30e39f776a73e1a99cabfb754b14494a3b

    • SHA512

      f2e3e0e2eda203567d01d17db1cb144fbfee4b9ca9e1ce8c3aabbd008876767cd18a78ef7226c872a66b638abe524e087b6bffa57abfdb72026274e5bf3643c8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks