General

  • Target

    138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c

  • Size

    216KB

  • Sample

    220212-ftnvnsgcg5

  • MD5

    476bbb40555295c09c0902bd4ca2fd22

  • SHA1

    d183fc03fb6db02e6532971517d609889d73d5e6

  • SHA256

    138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c

  • SHA512

    f44a01eca4094ffd160f5f8f1b179e4cfbfcbf1cdd74967a30f62508443a9ed060980cdf3f4a8748038a2356ffb2798b61f55aa67e8a50ca1dd2b92b5cd81888

Malware Config

Targets

    • Target

      138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c

    • Size

      216KB

    • MD5

      476bbb40555295c09c0902bd4ca2fd22

    • SHA1

      d183fc03fb6db02e6532971517d609889d73d5e6

    • SHA256

      138028b974d2d83c458f53eeda2d6e7d4faeeb12a82c57a67bbb840d8635a07c

    • SHA512

      f44a01eca4094ffd160f5f8f1b179e4cfbfcbf1cdd74967a30f62508443a9ed060980cdf3f4a8748038a2356ffb2798b61f55aa67e8a50ca1dd2b92b5cd81888

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks