General

  • Target

    1331ef20229f2b1208b53523e30309f7995d25ec6ea59352ce39a4c7026c5117

  • Size

    176KB

  • Sample

    220212-fyxndagdd2

  • MD5

    8a7af03e59a5513ef423f5293a362f74

  • SHA1

    6d00d269c6bf4c18460c5556aaacbca042d36359

  • SHA256

    1331ef20229f2b1208b53523e30309f7995d25ec6ea59352ce39a4c7026c5117

  • SHA512

    9ad8adea4e971b70822e7f8024e63c20b0c604f4838b47a90169a5f7fafdb84a7ec6bfaa5b474f174d0a21f99a41fc86827a262e1015f4fd9354f524280c9bd5

Malware Config

Targets

    • Target

      1331ef20229f2b1208b53523e30309f7995d25ec6ea59352ce39a4c7026c5117

    • Size

      176KB

    • MD5

      8a7af03e59a5513ef423f5293a362f74

    • SHA1

      6d00d269c6bf4c18460c5556aaacbca042d36359

    • SHA256

      1331ef20229f2b1208b53523e30309f7995d25ec6ea59352ce39a4c7026c5117

    • SHA512

      9ad8adea4e971b70822e7f8024e63c20b0c604f4838b47a90169a5f7fafdb84a7ec6bfaa5b474f174d0a21f99a41fc86827a262e1015f4fd9354f524280c9bd5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks