General

  • Target

    10326789a1f58e15e6380383b75c26bd31839c546c151c809cfe10a5d62e0d7b

  • Size

    150KB

  • Sample

    220212-g46c5shac5

  • MD5

    3f629761402a8770c542e7986c930c20

  • SHA1

    0b5849d450fc615720a8b35cfbd9ccdd9b324356

  • SHA256

    10326789a1f58e15e6380383b75c26bd31839c546c151c809cfe10a5d62e0d7b

  • SHA512

    6f957c0f62d66b9492bdea0bcc826688fd0c15b691d6ac60a151f80a61158a6f99926b8b84617ecd24ddd474d7edc520fdb06deba322c423f45fa862ff63359b

Malware Config

Targets

    • Target

      10326789a1f58e15e6380383b75c26bd31839c546c151c809cfe10a5d62e0d7b

    • Size

      150KB

    • MD5

      3f629761402a8770c542e7986c930c20

    • SHA1

      0b5849d450fc615720a8b35cfbd9ccdd9b324356

    • SHA256

      10326789a1f58e15e6380383b75c26bd31839c546c151c809cfe10a5d62e0d7b

    • SHA512

      6f957c0f62d66b9492bdea0bcc826688fd0c15b691d6ac60a151f80a61158a6f99926b8b84617ecd24ddd474d7edc520fdb06deba322c423f45fa862ff63359b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks