General

  • Target

    144b64555304f9bc1ae8d6ceae824ca151743157911659023d4ef2998ccac61c

  • Size

    216KB

  • Sample

    220212-ff3rnsgbe7

  • MD5

    8d88a23210696513c262607aa197f1be

  • SHA1

    c1f56591ec7ea5409d6afd34f6b190cdd6780935

  • SHA256

    144b64555304f9bc1ae8d6ceae824ca151743157911659023d4ef2998ccac61c

  • SHA512

    2005531ed80f78d57d97f61e09e653e7d45e3c27b3466fd068c26086cda651338f82ed60b6928b2039a40d715e7ff84ddcb77a151bc15998a7b4115aac2d2d03

Malware Config

Targets

    • Target

      144b64555304f9bc1ae8d6ceae824ca151743157911659023d4ef2998ccac61c

    • Size

      216KB

    • MD5

      8d88a23210696513c262607aa197f1be

    • SHA1

      c1f56591ec7ea5409d6afd34f6b190cdd6780935

    • SHA256

      144b64555304f9bc1ae8d6ceae824ca151743157911659023d4ef2998ccac61c

    • SHA512

      2005531ed80f78d57d97f61e09e653e7d45e3c27b3466fd068c26086cda651338f82ed60b6928b2039a40d715e7ff84ddcb77a151bc15998a7b4115aac2d2d03

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks