General

  • Target

    156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6

  • Size

    80KB

  • Sample

    220212-ezlf3ahecj

  • MD5

    f1f5b75bfb2565bd6e97d305d2ade120

  • SHA1

    48eb536870789537d57eb63ab3898bd9f1aa8451

  • SHA256

    156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6

  • SHA512

    0dc54d35e294347895198d1b6ec9d42cd50fefb4f1f2a70dd520eabf7e2f0cecd852beda98ab9f2519eb1250ce8fd6b55b6bd20f4e479e90664d89da39ee3d66

Malware Config

Targets

    • Target

      156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6

    • Size

      80KB

    • MD5

      f1f5b75bfb2565bd6e97d305d2ade120

    • SHA1

      48eb536870789537d57eb63ab3898bd9f1aa8451

    • SHA256

      156a712ffc3a1f28ee30c76d40af5c67dc769fb9634749bd8746f6a8ceff02c6

    • SHA512

      0dc54d35e294347895198d1b6ec9d42cd50fefb4f1f2a70dd520eabf7e2f0cecd852beda98ab9f2519eb1250ce8fd6b55b6bd20f4e479e90664d89da39ee3d66

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks