General

  • Target

    138e44e1be8013d7efe94968e28fd0d111e67e2efb723d5cb0051d2874708a8e

  • Size

    99KB

  • Sample

    220212-fs1g3shhem

  • MD5

    ead73ae3957f901273d63f28fce84c87

  • SHA1

    75ad8d915e0ba261c63306e509b77188fbedd703

  • SHA256

    138e44e1be8013d7efe94968e28fd0d111e67e2efb723d5cb0051d2874708a8e

  • SHA512

    06ceefee7d1e569a64414fb390faa59027c5643b058a1e9f16eef1f7b922b267f00cc731da7d7d87ae53db9ee3e366d43438cfad9001c7dd333da9ff534a47bb

Malware Config

Targets

    • Target

      138e44e1be8013d7efe94968e28fd0d111e67e2efb723d5cb0051d2874708a8e

    • Size

      99KB

    • MD5

      ead73ae3957f901273d63f28fce84c87

    • SHA1

      75ad8d915e0ba261c63306e509b77188fbedd703

    • SHA256

      138e44e1be8013d7efe94968e28fd0d111e67e2efb723d5cb0051d2874708a8e

    • SHA512

      06ceefee7d1e569a64414fb390faa59027c5643b058a1e9f16eef1f7b922b267f00cc731da7d7d87ae53db9ee3e366d43438cfad9001c7dd333da9ff534a47bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks