General

  • Target

    120c2d7d25f9206b7a299efef8f1799301bb333c61aab6b6c40a68f5e5031395

  • Size

    191KB

  • Sample

    220212-gc3g6sgeh3

  • MD5

    23b70376b13f430b89cf92516dbbe370

  • SHA1

    dbaad0e37ad32fb4f6303decd461d01b2f1e21cc

  • SHA256

    120c2d7d25f9206b7a299efef8f1799301bb333c61aab6b6c40a68f5e5031395

  • SHA512

    f791edfd39a4327fffd09dbc8a15a97c4aac5011f33f7b891f01dd7a809de82fe393180d11b858dc085ff46a877b4cc5c4ab6c65a1f499518e0813924e284b61

Malware Config

Targets

    • Target

      120c2d7d25f9206b7a299efef8f1799301bb333c61aab6b6c40a68f5e5031395

    • Size

      191KB

    • MD5

      23b70376b13f430b89cf92516dbbe370

    • SHA1

      dbaad0e37ad32fb4f6303decd461d01b2f1e21cc

    • SHA256

      120c2d7d25f9206b7a299efef8f1799301bb333c61aab6b6c40a68f5e5031395

    • SHA512

      f791edfd39a4327fffd09dbc8a15a97c4aac5011f33f7b891f01dd7a809de82fe393180d11b858dc085ff46a877b4cc5c4ab6c65a1f499518e0813924e284b61

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks