General

  • Target

    11db4880a0b014771b47d50f06290709537e477677daa3b65d75c519a50c3551

  • Size

    192KB

  • Sample

    220212-ge4s1sacbn

  • MD5

    b250b72c91995bda4d0474666edf2782

  • SHA1

    d2a3d022e8a9b69f5da26363dc03fbdf13b187f2

  • SHA256

    11db4880a0b014771b47d50f06290709537e477677daa3b65d75c519a50c3551

  • SHA512

    c0203b5119003f85afa3b09bd21b58c62eb2d01045b465de68cd77b4842a490130dfc03f45a3bf9fae9c0778054117c582a295027b4dc14ae2c14773794e28d9

Malware Config

Targets

    • Target

      11db4880a0b014771b47d50f06290709537e477677daa3b65d75c519a50c3551

    • Size

      192KB

    • MD5

      b250b72c91995bda4d0474666edf2782

    • SHA1

      d2a3d022e8a9b69f5da26363dc03fbdf13b187f2

    • SHA256

      11db4880a0b014771b47d50f06290709537e477677daa3b65d75c519a50c3551

    • SHA512

      c0203b5119003f85afa3b09bd21b58c62eb2d01045b465de68cd77b4842a490130dfc03f45a3bf9fae9c0778054117c582a295027b4dc14ae2c14773794e28d9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks