General

  • Target

    156917f47db25146c3f4abd774ad52c182599263c805eb05ba10acb8da699e8b

  • Size

    99KB

  • Sample

    220212-ezxt4ahecm

  • MD5

    a139c7005666da2cdb04067ed9f96d04

  • SHA1

    4ee7adaeee9bef1caa579ff58ecac6a0cd1226ff

  • SHA256

    156917f47db25146c3f4abd774ad52c182599263c805eb05ba10acb8da699e8b

  • SHA512

    43456b52e53343764598def5daa1cdc11a1d697cf7e9c809edb82e258f1f3df289097646793b98e6f1bc7a9065c8d063f2a63ec43ac033615cc7693cd9400a07

Malware Config

Targets

    • Target

      156917f47db25146c3f4abd774ad52c182599263c805eb05ba10acb8da699e8b

    • Size

      99KB

    • MD5

      a139c7005666da2cdb04067ed9f96d04

    • SHA1

      4ee7adaeee9bef1caa579ff58ecac6a0cd1226ff

    • SHA256

      156917f47db25146c3f4abd774ad52c182599263c805eb05ba10acb8da699e8b

    • SHA512

      43456b52e53343764598def5daa1cdc11a1d697cf7e9c809edb82e258f1f3df289097646793b98e6f1bc7a9065c8d063f2a63ec43ac033615cc7693cd9400a07

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks