General

  • Target

    141ab1099fcc7ba5790607e23ec2af17628b06c9a71fd0cdd780faa0ef042f48

  • Size

    99KB

  • Sample

    220212-fjj4qshgdj

  • MD5

    74ba28ae60ca7f800a31da499ce50ff0

  • SHA1

    b69d73fbd6bc8527612d6959916bc86c48a01621

  • SHA256

    141ab1099fcc7ba5790607e23ec2af17628b06c9a71fd0cdd780faa0ef042f48

  • SHA512

    6869ed12a41d78cf7b2a7e91f7ce34347a47e5403be60dc91aabc5f13001ccaa14e47250fa1dcbc09002a25c4ed2c4b4c8961dc2b5b9e9acf1e0a5f0089467b6

Malware Config

Targets

    • Target

      141ab1099fcc7ba5790607e23ec2af17628b06c9a71fd0cdd780faa0ef042f48

    • Size

      99KB

    • MD5

      74ba28ae60ca7f800a31da499ce50ff0

    • SHA1

      b69d73fbd6bc8527612d6959916bc86c48a01621

    • SHA256

      141ab1099fcc7ba5790607e23ec2af17628b06c9a71fd0cdd780faa0ef042f48

    • SHA512

      6869ed12a41d78cf7b2a7e91f7ce34347a47e5403be60dc91aabc5f13001ccaa14e47250fa1dcbc09002a25c4ed2c4b4c8961dc2b5b9e9acf1e0a5f0089467b6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks