General

  • Target

    116f0d1d760e41490935e851c3547c08b9e55d2720a298b7e0aba3c0154542e9

  • Size

    192KB

  • Sample

    220212-gk6jssacfr

  • MD5

    5bf9890f92fc07f11caf364e09ac6e66

  • SHA1

    e6542220995425e88af74744c0bd709affb4ffbe

  • SHA256

    116f0d1d760e41490935e851c3547c08b9e55d2720a298b7e0aba3c0154542e9

  • SHA512

    6e7128967ee56bfd52e340d8be170b1c6e8ad0d5a0e43abfd7729a40000bf18698ee4c6499942d5a1d74826b81a18e02eae25ba1c7a9eed5f0909cc8db87da61

Malware Config

Targets

    • Target

      116f0d1d760e41490935e851c3547c08b9e55d2720a298b7e0aba3c0154542e9

    • Size

      192KB

    • MD5

      5bf9890f92fc07f11caf364e09ac6e66

    • SHA1

      e6542220995425e88af74744c0bd709affb4ffbe

    • SHA256

      116f0d1d760e41490935e851c3547c08b9e55d2720a298b7e0aba3c0154542e9

    • SHA512

      6e7128967ee56bfd52e340d8be170b1c6e8ad0d5a0e43abfd7729a40000bf18698ee4c6499942d5a1d74826b81a18e02eae25ba1c7a9eed5f0909cc8db87da61

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks