General

  • Target

    122feb5bc37cb7b8690b05eee7dab8f9baf365db59ed3e0cf57c9e3fe8b60192

  • Size

    192KB

  • Sample

    220212-gbe1gsgeg2

  • MD5

    44427847d280c994e1a697bc417b0f8b

  • SHA1

    5148f618fa8cbc9011a790d4f6aa342d21b53887

  • SHA256

    122feb5bc37cb7b8690b05eee7dab8f9baf365db59ed3e0cf57c9e3fe8b60192

  • SHA512

    9fd74d955cac89a8397ca7fa598607a4aa05bb345985df8e7626352c678f7fcc0c34889dde3ba8773c796a9bd2f75c3c7fcfceab3bdd3279d4ac3e5bec294968

Malware Config

Targets

    • Target

      122feb5bc37cb7b8690b05eee7dab8f9baf365db59ed3e0cf57c9e3fe8b60192

    • Size

      192KB

    • MD5

      44427847d280c994e1a697bc417b0f8b

    • SHA1

      5148f618fa8cbc9011a790d4f6aa342d21b53887

    • SHA256

      122feb5bc37cb7b8690b05eee7dab8f9baf365db59ed3e0cf57c9e3fe8b60192

    • SHA512

      9fd74d955cac89a8397ca7fa598607a4aa05bb345985df8e7626352c678f7fcc0c34889dde3ba8773c796a9bd2f75c3c7fcfceab3bdd3279d4ac3e5bec294968

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks