General

  • Target

    1198002ef94b3b15f83728036c409e013eeac0127997c841e56d29ec762beabc

  • Size

    104KB

  • Sample

    220212-gh7zvaacek

  • MD5

    14dd016d8a5d6680c7a5738a94a6dee4

  • SHA1

    19ff5fd8286c86f279587d456e296cee337d2e10

  • SHA256

    1198002ef94b3b15f83728036c409e013eeac0127997c841e56d29ec762beabc

  • SHA512

    8f772b0cae953a0652867f9b32e2efa15f9c513b743d5c17e25fbb42ff5b54e4c559e24ea3db06b796a62f0c0721a1c96d4e09d570520c1441d9f6ef4b77f129

Malware Config

Targets

    • Target

      1198002ef94b3b15f83728036c409e013eeac0127997c841e56d29ec762beabc

    • Size

      104KB

    • MD5

      14dd016d8a5d6680c7a5738a94a6dee4

    • SHA1

      19ff5fd8286c86f279587d456e296cee337d2e10

    • SHA256

      1198002ef94b3b15f83728036c409e013eeac0127997c841e56d29ec762beabc

    • SHA512

      8f772b0cae953a0652867f9b32e2efa15f9c513b743d5c17e25fbb42ff5b54e4c559e24ea3db06b796a62f0c0721a1c96d4e09d570520c1441d9f6ef4b77f129

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks