General

  • Target

    1344e64c11b1ee645a1ae43d8a65a2826ffe2364dd2fe0ed118989965e0c8c97

  • Size

    191KB

  • Sample

    220212-fxvsdsgdb8

  • MD5

    a0c15dec4f91f12402d7ef672f186924

  • SHA1

    a409eb1ee4ac2e6749d416ad7bb1664bf156d8d8

  • SHA256

    1344e64c11b1ee645a1ae43d8a65a2826ffe2364dd2fe0ed118989965e0c8c97

  • SHA512

    27e08d21a0d9d7481dcc0593789fbe773eed1f968f07ed9eb2e6710be0ada85a2dc0d862d25e563244ac72ee39c86d44149011c41cac39050d765743f2712e8f

Malware Config

Targets

    • Target

      1344e64c11b1ee645a1ae43d8a65a2826ffe2364dd2fe0ed118989965e0c8c97

    • Size

      191KB

    • MD5

      a0c15dec4f91f12402d7ef672f186924

    • SHA1

      a409eb1ee4ac2e6749d416ad7bb1664bf156d8d8

    • SHA256

      1344e64c11b1ee645a1ae43d8a65a2826ffe2364dd2fe0ed118989965e0c8c97

    • SHA512

      27e08d21a0d9d7481dcc0593789fbe773eed1f968f07ed9eb2e6710be0ada85a2dc0d862d25e563244ac72ee39c86d44149011c41cac39050d765743f2712e8f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks