General

  • Target

    125aa3d5afc42340c4cd950231ccdb74ddc4da85068745dbf61af9973a6fdd1d

  • Size

    101KB

  • Sample

    220212-f9kg7aabdl

  • MD5

    9ac4a53520330083b035a86edb8ca0ac

  • SHA1

    3c5a7d0aa88007aa5862f8f55e17c1f467ced842

  • SHA256

    125aa3d5afc42340c4cd950231ccdb74ddc4da85068745dbf61af9973a6fdd1d

  • SHA512

    0447d743d647c89338315eb62de135db7a01b657013ec3c0da9792815cfe2d9a7eff6c27e14d267d17fc78329acd62ee3c3978c3d1c4bd4841d4e2aa41da6d5d

Malware Config

Targets

    • Target

      125aa3d5afc42340c4cd950231ccdb74ddc4da85068745dbf61af9973a6fdd1d

    • Size

      101KB

    • MD5

      9ac4a53520330083b035a86edb8ca0ac

    • SHA1

      3c5a7d0aa88007aa5862f8f55e17c1f467ced842

    • SHA256

      125aa3d5afc42340c4cd950231ccdb74ddc4da85068745dbf61af9973a6fdd1d

    • SHA512

      0447d743d647c89338315eb62de135db7a01b657013ec3c0da9792815cfe2d9a7eff6c27e14d267d17fc78329acd62ee3c3978c3d1c4bd4841d4e2aa41da6d5d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks