General

  • Target

    148956ead3c53da72bf2a3b8dacb08531850f774145073884538846c38a6c767

  • Size

    79KB

  • Sample

    220212-fd3znahffq

  • MD5

    b8dc5f076358fe96d532b013bde6e008

  • SHA1

    d026d3091f521c8abe7e01835c23919019430800

  • SHA256

    148956ead3c53da72bf2a3b8dacb08531850f774145073884538846c38a6c767

  • SHA512

    c7a9c500b7dcb57dae369725dc52081cbe6726cce417b7a9ac2bc4515673d5a16ae5e380f930990cb934b7b689040e08c4d2d35fc58c8e624d1892ffe5ab3b2c

Malware Config

Targets

    • Target

      148956ead3c53da72bf2a3b8dacb08531850f774145073884538846c38a6c767

    • Size

      79KB

    • MD5

      b8dc5f076358fe96d532b013bde6e008

    • SHA1

      d026d3091f521c8abe7e01835c23919019430800

    • SHA256

      148956ead3c53da72bf2a3b8dacb08531850f774145073884538846c38a6c767

    • SHA512

      c7a9c500b7dcb57dae369725dc52081cbe6726cce417b7a9ac2bc4515673d5a16ae5e380f930990cb934b7b689040e08c4d2d35fc58c8e624d1892ffe5ab3b2c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks