General

  • Target

    1077133bc8f48bf51921ef6ccd58fc9ff6b7e404a63102ffcdb40d50be76a13b

  • Size

    80KB

  • Sample

    220212-g1eq1sghf7

  • MD5

    981a135f6a03d8e7c134d97c4d11d304

  • SHA1

    bc5153e28480bd46f7145ea43a38212dd9ab0acf

  • SHA256

    1077133bc8f48bf51921ef6ccd58fc9ff6b7e404a63102ffcdb40d50be76a13b

  • SHA512

    5df7783fe8675adb4d3354b08b4531db13e10ec5db24d3ed4ff51df3182b815bd5f10fc5c44d928858d707c289588ee2fc9b7d04b03f9f48400b19a61af53c86

Malware Config

Targets

    • Target

      1077133bc8f48bf51921ef6ccd58fc9ff6b7e404a63102ffcdb40d50be76a13b

    • Size

      80KB

    • MD5

      981a135f6a03d8e7c134d97c4d11d304

    • SHA1

      bc5153e28480bd46f7145ea43a38212dd9ab0acf

    • SHA256

      1077133bc8f48bf51921ef6ccd58fc9ff6b7e404a63102ffcdb40d50be76a13b

    • SHA512

      5df7783fe8675adb4d3354b08b4531db13e10ec5db24d3ed4ff51df3182b815bd5f10fc5c44d928858d707c289588ee2fc9b7d04b03f9f48400b19a61af53c86

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks