General

  • Target

    11e9b985f32d7d89d97b0aa6d18bdcf3630e45514d90ed8c006b81b716b73983

  • Size

    99KB

  • Sample

    220212-geffesgfa4

  • MD5

    3c6c39becd961ee54bfbfb7d751cadac

  • SHA1

    78bbd4e6cf38eafc34ffec9bd759fb8b1ae49ecc

  • SHA256

    11e9b985f32d7d89d97b0aa6d18bdcf3630e45514d90ed8c006b81b716b73983

  • SHA512

    3d14d5b2e46de198af15a1472fafeccd1b42eb0a79ee8579e35fdde80e93f16dd83159a46f66fb223ee6ce84541df520c99d8e7ed659343ec5761772eaaf7545

Malware Config

Targets

    • Target

      11e9b985f32d7d89d97b0aa6d18bdcf3630e45514d90ed8c006b81b716b73983

    • Size

      99KB

    • MD5

      3c6c39becd961ee54bfbfb7d751cadac

    • SHA1

      78bbd4e6cf38eafc34ffec9bd759fb8b1ae49ecc

    • SHA256

      11e9b985f32d7d89d97b0aa6d18bdcf3630e45514d90ed8c006b81b716b73983

    • SHA512

      3d14d5b2e46de198af15a1472fafeccd1b42eb0a79ee8579e35fdde80e93f16dd83159a46f66fb223ee6ce84541df520c99d8e7ed659343ec5761772eaaf7545

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks