General

  • Target

    11fa9a7fa2ea0107804cfa0f4fdfccbc26717d216e3b05b1ba5de5398bfe4520

  • Size

    176KB

  • Sample

    220212-gdxcjsgeh9

  • MD5

    a7099c7775e5355035f26adff3f2f2d8

  • SHA1

    63082c541419e0acc33d884aa8baa56abcc77ca8

  • SHA256

    11fa9a7fa2ea0107804cfa0f4fdfccbc26717d216e3b05b1ba5de5398bfe4520

  • SHA512

    d9d834a43de3a387778a84d42f54e68c7b85ce32985bfccc54250056709aeed7a16a489549dbd5f2326085ca72a0be30c31b51cdf514a075881fc2e47421bdb3

Malware Config

Targets

    • Target

      11fa9a7fa2ea0107804cfa0f4fdfccbc26717d216e3b05b1ba5de5398bfe4520

    • Size

      176KB

    • MD5

      a7099c7775e5355035f26adff3f2f2d8

    • SHA1

      63082c541419e0acc33d884aa8baa56abcc77ca8

    • SHA256

      11fa9a7fa2ea0107804cfa0f4fdfccbc26717d216e3b05b1ba5de5398bfe4520

    • SHA512

      d9d834a43de3a387778a84d42f54e68c7b85ce32985bfccc54250056709aeed7a16a489549dbd5f2326085ca72a0be30c31b51cdf514a075881fc2e47421bdb3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks