General

  • Target

    13c550e9056cc92f3eb412e25207cc3a423600842436879c557026cd0951838f

  • Size

    101KB

  • Sample

    220212-fp9lkshhbq

  • MD5

    6f82dec9902c9797c4c7ea1f34d26304

  • SHA1

    0e875e677b0cc8e25a6f7c358522ec5c36aec5c9

  • SHA256

    13c550e9056cc92f3eb412e25207cc3a423600842436879c557026cd0951838f

  • SHA512

    4898b819e5ba61488da29a784411511ab521222206c24121582169e8c0be6e31475cf881fa3117dfc26d7e068f26cb381b13de6a5782511b68db4ee173e8ab70

Malware Config

Targets

    • Target

      13c550e9056cc92f3eb412e25207cc3a423600842436879c557026cd0951838f

    • Size

      101KB

    • MD5

      6f82dec9902c9797c4c7ea1f34d26304

    • SHA1

      0e875e677b0cc8e25a6f7c358522ec5c36aec5c9

    • SHA256

      13c550e9056cc92f3eb412e25207cc3a423600842436879c557026cd0951838f

    • SHA512

      4898b819e5ba61488da29a784411511ab521222206c24121582169e8c0be6e31475cf881fa3117dfc26d7e068f26cb381b13de6a5782511b68db4ee173e8ab70

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks