General

  • Target

    156a29393d79c9d61a5195512fb87502193c5759a54644233e37ed1eb25cfa9c

  • Size

    216KB

  • Sample

    220212-ezsv5sfhh9

  • MD5

    ac61247c0a3edf299feb2971cad4239b

  • SHA1

    1fe3d9375bc2f0f046ef0339c3d44e04023cb1bd

  • SHA256

    156a29393d79c9d61a5195512fb87502193c5759a54644233e37ed1eb25cfa9c

  • SHA512

    cb627eb0f68f139f920e5836ad238cfa0a187c6b2c36063a692a35d82608b25fe2b9b849707374e56e5c28084f4bbf3518a842eecba5760a9c94d16e64597311

Malware Config

Targets

    • Target

      156a29393d79c9d61a5195512fb87502193c5759a54644233e37ed1eb25cfa9c

    • Size

      216KB

    • MD5

      ac61247c0a3edf299feb2971cad4239b

    • SHA1

      1fe3d9375bc2f0f046ef0339c3d44e04023cb1bd

    • SHA256

      156a29393d79c9d61a5195512fb87502193c5759a54644233e37ed1eb25cfa9c

    • SHA512

      cb627eb0f68f139f920e5836ad238cfa0a187c6b2c36063a692a35d82608b25fe2b9b849707374e56e5c28084f4bbf3518a842eecba5760a9c94d16e64597311

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks