General

  • Target

    1568ca72b568cfb7e4d92cae6cc4f04520fe89a5723a4e837e1ad0bdeedaba50

  • Size

    101KB

  • Sample

    220212-ezzzfsgaa3

  • MD5

    42ba79f306fe389ee22e2d4d6d2da823

  • SHA1

    7b682060195263bf779c1f4ffd70f44fccc2fa07

  • SHA256

    1568ca72b568cfb7e4d92cae6cc4f04520fe89a5723a4e837e1ad0bdeedaba50

  • SHA512

    fbb3e65acc8772df4695905e80d298c37b9df552e09497671f4d6f97d7c998c437073a85df4542d7d1903a7b8f44d4f1fee924178eba265f252bd5eb19839c4d

Malware Config

Targets

    • Target

      1568ca72b568cfb7e4d92cae6cc4f04520fe89a5723a4e837e1ad0bdeedaba50

    • Size

      101KB

    • MD5

      42ba79f306fe389ee22e2d4d6d2da823

    • SHA1

      7b682060195263bf779c1f4ffd70f44fccc2fa07

    • SHA256

      1568ca72b568cfb7e4d92cae6cc4f04520fe89a5723a4e837e1ad0bdeedaba50

    • SHA512

      fbb3e65acc8772df4695905e80d298c37b9df552e09497671f4d6f97d7c998c437073a85df4542d7d1903a7b8f44d4f1fee924178eba265f252bd5eb19839c4d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks