General

  • Target

    1569a4fb85209b44cc1e1983010281239e82baadeddef73b754266e5b19bf46a

  • Size

    191KB

  • Sample

    220212-ezv1hagaa2

  • MD5

    1093dcfcfd1027ae85a2a5b7db5192b3

  • SHA1

    08467c19fc2bd45d7693e7579c36300876d9c720

  • SHA256

    1569a4fb85209b44cc1e1983010281239e82baadeddef73b754266e5b19bf46a

  • SHA512

    1f08c985e1a6c9837f6f560c17c77cb0fa390418c23cc4f273e7ff8164f8af8f65521177a444c39f4de45c5a5f1ebbf8addd57da4b2e1bea8b831d7bdedd3980

Malware Config

Targets

    • Target

      1569a4fb85209b44cc1e1983010281239e82baadeddef73b754266e5b19bf46a

    • Size

      191KB

    • MD5

      1093dcfcfd1027ae85a2a5b7db5192b3

    • SHA1

      08467c19fc2bd45d7693e7579c36300876d9c720

    • SHA256

      1569a4fb85209b44cc1e1983010281239e82baadeddef73b754266e5b19bf46a

    • SHA512

      1f08c985e1a6c9837f6f560c17c77cb0fa390418c23cc4f273e7ff8164f8af8f65521177a444c39f4de45c5a5f1ebbf8addd57da4b2e1bea8b831d7bdedd3980

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks