General

  • Target

    107820184424a56f7c1cd0a61f47ce72a36043bd5fc0342aa63bcb558a93e75f

  • Size

    80KB

  • Sample

    220212-g1clnaaecp

  • MD5

    8d6340e322478cf21866aadd20f5434c

  • SHA1

    2a74760bfa3aee97159f7e31ba98da0bbe0b442b

  • SHA256

    107820184424a56f7c1cd0a61f47ce72a36043bd5fc0342aa63bcb558a93e75f

  • SHA512

    1bf7975e0c580416abba7a4340c6710ef079bcaa35c27d41bffa53d58efc51868a269eb289bf1bb79fcbaee575f8e8a2ac462f1483bdb5d75d9cdcce2480a18a

Malware Config

Targets

    • Target

      107820184424a56f7c1cd0a61f47ce72a36043bd5fc0342aa63bcb558a93e75f

    • Size

      80KB

    • MD5

      8d6340e322478cf21866aadd20f5434c

    • SHA1

      2a74760bfa3aee97159f7e31ba98da0bbe0b442b

    • SHA256

      107820184424a56f7c1cd0a61f47ce72a36043bd5fc0342aa63bcb558a93e75f

    • SHA512

      1bf7975e0c580416abba7a4340c6710ef079bcaa35c27d41bffa53d58efc51868a269eb289bf1bb79fcbaee575f8e8a2ac462f1483bdb5d75d9cdcce2480a18a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks