General

  • Target

    116c972bb817ebc9b2b4b13b6c0907370f203a1954ee32854db7b9a26f178cfe

  • Size

    99KB

  • Sample

    220212-gk8n6agfh4

  • MD5

    17ce110b253fc93de0c011094e3e01b3

  • SHA1

    2573186aa6bada32813903f7f5028f7d6f90e06c

  • SHA256

    116c972bb817ebc9b2b4b13b6c0907370f203a1954ee32854db7b9a26f178cfe

  • SHA512

    63272e7ca9e2b281d699469546b8056dc5818077b519cd0303052e4d2f3e5d9e82fc8c6cc9e515a3da8de71551c165b74722442084cea6b51a29e5fc388db30d

Malware Config

Targets

    • Target

      116c972bb817ebc9b2b4b13b6c0907370f203a1954ee32854db7b9a26f178cfe

    • Size

      99KB

    • MD5

      17ce110b253fc93de0c011094e3e01b3

    • SHA1

      2573186aa6bada32813903f7f5028f7d6f90e06c

    • SHA256

      116c972bb817ebc9b2b4b13b6c0907370f203a1954ee32854db7b9a26f178cfe

    • SHA512

      63272e7ca9e2b281d699469546b8056dc5818077b519cd0303052e4d2f3e5d9e82fc8c6cc9e515a3da8de71551c165b74722442084cea6b51a29e5fc388db30d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks