General

  • Target

    120a717c9b8ad4938a99f94a717155afc56174a0a972b2c5f771d7e130848392

  • Size

    216KB

  • Sample

    220212-gc5mjageh4

  • MD5

    5528ce22653262b97f0cfc0084bc7ce7

  • SHA1

    45afbe3a99b4bfb21e0f617a20720bdcdd896d8c

  • SHA256

    120a717c9b8ad4938a99f94a717155afc56174a0a972b2c5f771d7e130848392

  • SHA512

    8523a383928f8def29cddb00a81503d29c7bc04673d6698ff188284ab824ce006ba19263e2bc82d9f6080d945f23ffb57fe87336911c4edf32050b1c5b39a3ad

Malware Config

Targets

    • Target

      120a717c9b8ad4938a99f94a717155afc56174a0a972b2c5f771d7e130848392

    • Size

      216KB

    • MD5

      5528ce22653262b97f0cfc0084bc7ce7

    • SHA1

      45afbe3a99b4bfb21e0f617a20720bdcdd896d8c

    • SHA256

      120a717c9b8ad4938a99f94a717155afc56174a0a972b2c5f771d7e130848392

    • SHA512

      8523a383928f8def29cddb00a81503d29c7bc04673d6698ff188284ab824ce006ba19263e2bc82d9f6080d945f23ffb57fe87336911c4edf32050b1c5b39a3ad

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks