General

  • Target

    148efb9267460a0ec04b659a972699e74ce377492facc02cb27ec8d278346dc3

  • Size

    176KB

  • Sample

    220212-fdwwcagbc8

  • MD5

    2228d4e780683a618c56802a804eccc9

  • SHA1

    eaa2bf8a814ae0f2b27a8398629236a099162bdd

  • SHA256

    148efb9267460a0ec04b659a972699e74ce377492facc02cb27ec8d278346dc3

  • SHA512

    90f316cd52d2d92301288c6cd5f27ef7258076bba52cc6f836ac50dc9a1c8d4678f7e38a2d4443d312bc90310908fcbca2bfaa9e558aa13c83321fac5bedc7bb

Malware Config

Targets

    • Target

      148efb9267460a0ec04b659a972699e74ce377492facc02cb27ec8d278346dc3

    • Size

      176KB

    • MD5

      2228d4e780683a618c56802a804eccc9

    • SHA1

      eaa2bf8a814ae0f2b27a8398629236a099162bdd

    • SHA256

      148efb9267460a0ec04b659a972699e74ce377492facc02cb27ec8d278346dc3

    • SHA512

      90f316cd52d2d92301288c6cd5f27ef7258076bba52cc6f836ac50dc9a1c8d4678f7e38a2d4443d312bc90310908fcbca2bfaa9e558aa13c83321fac5bedc7bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks