General

  • Target

    1042e83603c9b71bfc4c4e11b4a08c124375ea6a544e93294bdde573346a51e2

  • Size

    168KB

  • Sample

    220212-g32zbshab2

  • MD5

    3e9eda33ab4a466ab04fbcba518f6227

  • SHA1

    c1df33e7001e9296927d6cd768d2eae85a5cf3d8

  • SHA256

    1042e83603c9b71bfc4c4e11b4a08c124375ea6a544e93294bdde573346a51e2

  • SHA512

    48641522b3ed2cfb1984487d8a2f414a2980f83ad323d1a33df86ee08e978b592aa1f0c46106b07736f41cadbd57674a88825acd2fe8ece54e5d72c505ce3ff7

Malware Config

Targets

    • Target

      1042e83603c9b71bfc4c4e11b4a08c124375ea6a544e93294bdde573346a51e2

    • Size

      168KB

    • MD5

      3e9eda33ab4a466ab04fbcba518f6227

    • SHA1

      c1df33e7001e9296927d6cd768d2eae85a5cf3d8

    • SHA256

      1042e83603c9b71bfc4c4e11b4a08c124375ea6a544e93294bdde573346a51e2

    • SHA512

      48641522b3ed2cfb1984487d8a2f414a2980f83ad323d1a33df86ee08e978b592aa1f0c46106b07736f41cadbd57674a88825acd2fe8ece54e5d72c505ce3ff7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks