General

  • Target

    1496f65f885df7a5e95154a38aa6fd1fc3ad0a8917f27129430d9dd1d6ee6c27

  • Size

    192KB

  • Sample

    220212-fdhcysgbc5

  • MD5

    e719906766439550d92fc92cefb2b4c4

  • SHA1

    c72be3b2ddf9b5fe10c25f81d460000cc9eed734

  • SHA256

    1496f65f885df7a5e95154a38aa6fd1fc3ad0a8917f27129430d9dd1d6ee6c27

  • SHA512

    472a6355f8b641c8f568dd65414f1735181a42c51d82d1c977e0f3e75a81dd31d806403d2244c2212093af7e250ee1e59d1211f856b6c36c661faa08d78c34f3

Malware Config

Targets

    • Target

      1496f65f885df7a5e95154a38aa6fd1fc3ad0a8917f27129430d9dd1d6ee6c27

    • Size

      192KB

    • MD5

      e719906766439550d92fc92cefb2b4c4

    • SHA1

      c72be3b2ddf9b5fe10c25f81d460000cc9eed734

    • SHA256

      1496f65f885df7a5e95154a38aa6fd1fc3ad0a8917f27129430d9dd1d6ee6c27

    • SHA512

      472a6355f8b641c8f568dd65414f1735181a42c51d82d1c977e0f3e75a81dd31d806403d2244c2212093af7e250ee1e59d1211f856b6c36c661faa08d78c34f3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks