General

  • Target

    1372e2dd23b6d6c645c30021cd04683e03bf63ae6deb1049150a4adf4ba3918e

  • Size

    150KB

  • Sample

    220212-ft86lsgch2

  • MD5

    157c4e5724f2aecf635ea993b10704af

  • SHA1

    5f11cf9f976aae19c58d278b43e9599ae02b5461

  • SHA256

    1372e2dd23b6d6c645c30021cd04683e03bf63ae6deb1049150a4adf4ba3918e

  • SHA512

    74adf8ce43f891af3a3a452db5af2906e7f16b785297ab40fae07b37eba968069442608fcb2dc2950685714d5896e93350b6992e1a527349fbab73bc4846210b

Malware Config

Targets

    • Target

      1372e2dd23b6d6c645c30021cd04683e03bf63ae6deb1049150a4adf4ba3918e

    • Size

      150KB

    • MD5

      157c4e5724f2aecf635ea993b10704af

    • SHA1

      5f11cf9f976aae19c58d278b43e9599ae02b5461

    • SHA256

      1372e2dd23b6d6c645c30021cd04683e03bf63ae6deb1049150a4adf4ba3918e

    • SHA512

      74adf8ce43f891af3a3a452db5af2906e7f16b785297ab40fae07b37eba968069442608fcb2dc2950685714d5896e93350b6992e1a527349fbab73bc4846210b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks