General

  • Target

    100fa3ade4910db94e29e1e25caba8121250ed8a75f6bc94c9aff6b12c9cf29c

  • Size

    150KB

  • Sample

    220212-g6l3aahad7

  • MD5

    0b9f6ddbd031e191631a77e63104cf55

  • SHA1

    181ec45e0a128fefc0eb0d019733bfaee9fd87e5

  • SHA256

    100fa3ade4910db94e29e1e25caba8121250ed8a75f6bc94c9aff6b12c9cf29c

  • SHA512

    f877ab880c80a22b4b84d1e6b68c44497facfc79fe3d6acfe19f3b31922617ca960bc8f36c6b84af5726542fc6e0e2a021ebc16606f63a6c0b7fb743289fef1f

Malware Config

Targets

    • Target

      100fa3ade4910db94e29e1e25caba8121250ed8a75f6bc94c9aff6b12c9cf29c

    • Size

      150KB

    • MD5

      0b9f6ddbd031e191631a77e63104cf55

    • SHA1

      181ec45e0a128fefc0eb0d019733bfaee9fd87e5

    • SHA256

      100fa3ade4910db94e29e1e25caba8121250ed8a75f6bc94c9aff6b12c9cf29c

    • SHA512

      f877ab880c80a22b4b84d1e6b68c44497facfc79fe3d6acfe19f3b31922617ca960bc8f36c6b84af5726542fc6e0e2a021ebc16606f63a6c0b7fb743289fef1f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks