General

  • Target

    11e81e407ebcbc86abf52595270aaa0956f5c1f7cea2d470faa31639ab633dca

  • Size

    101KB

  • Sample

    220212-gehksagfa5

  • MD5

    367c0968f6cc7d8924cba30d00a8f0dc

  • SHA1

    bc1c26003574c0f8889efb61f46bb75266fe4fef

  • SHA256

    11e81e407ebcbc86abf52595270aaa0956f5c1f7cea2d470faa31639ab633dca

  • SHA512

    dfb4fc00e0b693793eb55db57c4f210976c6487773d77e73b7804741f31e268c70458371d6d574131ebc4b04df997048170a25eaa1808fbac77cd6d9f82efefb

Malware Config

Targets

    • Target

      11e81e407ebcbc86abf52595270aaa0956f5c1f7cea2d470faa31639ab633dca

    • Size

      101KB

    • MD5

      367c0968f6cc7d8924cba30d00a8f0dc

    • SHA1

      bc1c26003574c0f8889efb61f46bb75266fe4fef

    • SHA256

      11e81e407ebcbc86abf52595270aaa0956f5c1f7cea2d470faa31639ab633dca

    • SHA512

      dfb4fc00e0b693793eb55db57c4f210976c6487773d77e73b7804741f31e268c70458371d6d574131ebc4b04df997048170a25eaa1808fbac77cd6d9f82efefb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks