General

  • Target

    100a0ecf0a794e803898f890767a28dee5a472fa6ab54d12ef2d1649108ac115

  • Size

    89KB

  • Sample

    220212-g64bkahae4

  • MD5

    d564e67e8cc4bee4200f7aa5c6d244b3

  • SHA1

    d07cde44cf51683baa350dd1128d4df609f0e3ec

  • SHA256

    100a0ecf0a794e803898f890767a28dee5a472fa6ab54d12ef2d1649108ac115

  • SHA512

    c78389cf2c48a531e3e04e5e729495cf6fba1d7a3398eae10c99a33debe6d1a9e0ef37476718052803526f6d2d789076f10f354d7cf05535a7712395c58da0c7

Malware Config

Targets

    • Target

      100a0ecf0a794e803898f890767a28dee5a472fa6ab54d12ef2d1649108ac115

    • Size

      89KB

    • MD5

      d564e67e8cc4bee4200f7aa5c6d244b3

    • SHA1

      d07cde44cf51683baa350dd1128d4df609f0e3ec

    • SHA256

      100a0ecf0a794e803898f890767a28dee5a472fa6ab54d12ef2d1649108ac115

    • SHA512

      c78389cf2c48a531e3e04e5e729495cf6fba1d7a3398eae10c99a33debe6d1a9e0ef37476718052803526f6d2d789076f10f354d7cf05535a7712395c58da0c7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks