General

  • Target

    142a6c8c0e21839773b7abfd86e5e906e9d91731e9a4aca16390778fc9e50688

  • Size

    80KB

  • Sample

    220212-fhr3yshgbq

  • MD5

    acae58670ef65628947dad9f8cd6d91c

  • SHA1

    18d32fa885b0898ffbc8c1244032e1b71bfdfce5

  • SHA256

    142a6c8c0e21839773b7abfd86e5e906e9d91731e9a4aca16390778fc9e50688

  • SHA512

    f0d27381f9a85905b9e5acc1ba90ffef3ff77011bdfa3a3aeb80a1a59807403061312f4386d38f7a1e6548e5dde34fd9f48a49ecab3b1f66165057feb26c87a7

Malware Config

Targets

    • Target

      142a6c8c0e21839773b7abfd86e5e906e9d91731e9a4aca16390778fc9e50688

    • Size

      80KB

    • MD5

      acae58670ef65628947dad9f8cd6d91c

    • SHA1

      18d32fa885b0898ffbc8c1244032e1b71bfdfce5

    • SHA256

      142a6c8c0e21839773b7abfd86e5e906e9d91731e9a4aca16390778fc9e50688

    • SHA512

      f0d27381f9a85905b9e5acc1ba90ffef3ff77011bdfa3a3aeb80a1a59807403061312f4386d38f7a1e6548e5dde34fd9f48a49ecab3b1f66165057feb26c87a7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks