General

  • Target

    128e514ed912e3b13736ceadce1e40ee31c9dc0224170fee6d40261d1417ae62

  • Size

    150KB

  • Sample

    220212-f7gzaagec6

  • MD5

    c77ad87992f4586da9634e7c7f35c71b

  • SHA1

    94b7f3344138afdab705a586375b4b56b0778528

  • SHA256

    128e514ed912e3b13736ceadce1e40ee31c9dc0224170fee6d40261d1417ae62

  • SHA512

    9003bbce1a2c272fc54bc9f1db48ccd484a96bcbcfa602b7d29af74de839c35a9042e3bc17ff9a1edd0dde7058a837d7ac5231bbdb423d4f727e43c1e7d923ee

Malware Config

Targets

    • Target

      128e514ed912e3b13736ceadce1e40ee31c9dc0224170fee6d40261d1417ae62

    • Size

      150KB

    • MD5

      c77ad87992f4586da9634e7c7f35c71b

    • SHA1

      94b7f3344138afdab705a586375b4b56b0778528

    • SHA256

      128e514ed912e3b13736ceadce1e40ee31c9dc0224170fee6d40261d1417ae62

    • SHA512

      9003bbce1a2c272fc54bc9f1db48ccd484a96bcbcfa602b7d29af74de839c35a9042e3bc17ff9a1edd0dde7058a837d7ac5231bbdb423d4f727e43c1e7d923ee

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks