General

  • Target

    100c1d367329693cb1dc305c6a2ddf3fd42dcc920564305d03c06400b25f0950

  • Size

    79KB

  • Sample

    220212-g62gzahae3

  • MD5

    7d6def0580d252d7bc98643925de7131

  • SHA1

    1c5143987e1f1ccbb3ae0566132fe14ca6fe8d29

  • SHA256

    100c1d367329693cb1dc305c6a2ddf3fd42dcc920564305d03c06400b25f0950

  • SHA512

    45c44e5a6a767c9dbb1e99468e8b6abf5b351f2c711030db1ade11c3dcc56983324907639b85a410f39e54eb5e6e0302658da89dc32de6c9f30a1bf5d4609d00

Malware Config

Targets

    • Target

      100c1d367329693cb1dc305c6a2ddf3fd42dcc920564305d03c06400b25f0950

    • Size

      79KB

    • MD5

      7d6def0580d252d7bc98643925de7131

    • SHA1

      1c5143987e1f1ccbb3ae0566132fe14ca6fe8d29

    • SHA256

      100c1d367329693cb1dc305c6a2ddf3fd42dcc920564305d03c06400b25f0950

    • SHA512

      45c44e5a6a767c9dbb1e99468e8b6abf5b351f2c711030db1ade11c3dcc56983324907639b85a410f39e54eb5e6e0302658da89dc32de6c9f30a1bf5d4609d00

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks