General

  • Target

    1494e755eee8363311e8715bb2e6f024f416a74c742167caac6dc541c42f1ca2

  • Size

    200KB

  • Sample

    220212-fdks3sgbc6

  • MD5

    b8d37c0b5358103da6bc758f2954055f

  • SHA1

    5469a8555be42f44d32af60c23370d9b4f3f557b

  • SHA256

    1494e755eee8363311e8715bb2e6f024f416a74c742167caac6dc541c42f1ca2

  • SHA512

    44130ebe23aac88bc631c758dc4e5d42cb0f9c1114d7b1419de87f8cb363c2ec45622c8b4e64a5412c5ad8efb4a341db7fa5e9592f759d74d09d2fb2240aeaf5

Malware Config

Targets

    • Target

      1494e755eee8363311e8715bb2e6f024f416a74c742167caac6dc541c42f1ca2

    • Size

      200KB

    • MD5

      b8d37c0b5358103da6bc758f2954055f

    • SHA1

      5469a8555be42f44d32af60c23370d9b4f3f557b

    • SHA256

      1494e755eee8363311e8715bb2e6f024f416a74c742167caac6dc541c42f1ca2

    • SHA512

      44130ebe23aac88bc631c758dc4e5d42cb0f9c1114d7b1419de87f8cb363c2ec45622c8b4e64a5412c5ad8efb4a341db7fa5e9592f759d74d09d2fb2240aeaf5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks