General

  • Target

    11ec1b86317d3bfa2f56ac3e5c84cc6028bf5bfbe9f0f2004645ab6997a56f8b

  • Size

    191KB

  • Sample

    220212-gedltsgfa3

  • MD5

    db46adb8c349b2eda959f2d6959f87c4

  • SHA1

    0ffe9fde60654d7945e4426969d7ee1021a78ff8

  • SHA256

    11ec1b86317d3bfa2f56ac3e5c84cc6028bf5bfbe9f0f2004645ab6997a56f8b

  • SHA512

    a789e7752822b7f949491acc6c388e927e5cb9117e5eaa4dda765d2dc2e25f27a42f47a2b6bc61762819cc6cc10694993d5ed2f3abaac68db8865072ddee407b

Malware Config

Targets

    • Target

      11ec1b86317d3bfa2f56ac3e5c84cc6028bf5bfbe9f0f2004645ab6997a56f8b

    • Size

      191KB

    • MD5

      db46adb8c349b2eda959f2d6959f87c4

    • SHA1

      0ffe9fde60654d7945e4426969d7ee1021a78ff8

    • SHA256

      11ec1b86317d3bfa2f56ac3e5c84cc6028bf5bfbe9f0f2004645ab6997a56f8b

    • SHA512

      a789e7752822b7f949491acc6c388e927e5cb9117e5eaa4dda765d2dc2e25f27a42f47a2b6bc61762819cc6cc10694993d5ed2f3abaac68db8865072ddee407b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks