General

  • Target

    1472237231d832743caad8e7071c5b77e62c9d1ee43199fb0156ef639b8d8584

  • Size

    191KB

  • Sample

    220212-feqqqahfgn

  • MD5

    d9efde24aca1e188532e69a2b15111ca

  • SHA1

    ca2b81b1ad5a51a44687f906b6e73cc41ed9fa48

  • SHA256

    1472237231d832743caad8e7071c5b77e62c9d1ee43199fb0156ef639b8d8584

  • SHA512

    067df66e8ff3a532403cd7d08f5c8ccd0fee6fee9663276ebe2bf507da1a7c51d0c9e9ef419ed5c8905957d7b8dda632e8ddf14c7383b1e7b65bbc0fdba53110

Malware Config

Targets

    • Target

      1472237231d832743caad8e7071c5b77e62c9d1ee43199fb0156ef639b8d8584

    • Size

      191KB

    • MD5

      d9efde24aca1e188532e69a2b15111ca

    • SHA1

      ca2b81b1ad5a51a44687f906b6e73cc41ed9fa48

    • SHA256

      1472237231d832743caad8e7071c5b77e62c9d1ee43199fb0156ef639b8d8584

    • SHA512

      067df66e8ff3a532403cd7d08f5c8ccd0fee6fee9663276ebe2bf507da1a7c51d0c9e9ef419ed5c8905957d7b8dda632e8ddf14c7383b1e7b65bbc0fdba53110

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks