General

  • Target

    133861bbc61fb7032f7b460a670ea56b7b5f313ab35175cbe46bdaf315a25c2b

  • Size

    216KB

  • Sample

    220212-fyc9qsgdc4

  • MD5

    356a98a736e70fb618c73f8996969292

  • SHA1

    c731bb849158a62476d62c3c041a3304e079e112

  • SHA256

    133861bbc61fb7032f7b460a670ea56b7b5f313ab35175cbe46bdaf315a25c2b

  • SHA512

    45f0056e590f11cc11bbeaa9f5afc1cff3142b15884d245aff9836a5d813da4ce4694bd17580877a30282ab165f8c9123c979f96c923df8a81075ec508477217

Malware Config

Targets

    • Target

      133861bbc61fb7032f7b460a670ea56b7b5f313ab35175cbe46bdaf315a25c2b

    • Size

      216KB

    • MD5

      356a98a736e70fb618c73f8996969292

    • SHA1

      c731bb849158a62476d62c3c041a3304e079e112

    • SHA256

      133861bbc61fb7032f7b460a670ea56b7b5f313ab35175cbe46bdaf315a25c2b

    • SHA512

      45f0056e590f11cc11bbeaa9f5afc1cff3142b15884d245aff9836a5d813da4ce4694bd17580877a30282ab165f8c9123c979f96c923df8a81075ec508477217

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks