General

  • Target

    11724aa93bd21b8641051094e1a24ee57fe46fdd3cbb53d14497689f911ea86e

  • Size

    100KB

  • Sample

    220212-gkwplagfg8

  • MD5

    b24b50554daa566f3917f2ce32946b73

  • SHA1

    1a846ac68bcfb867455f7f466ee72e7084df8016

  • SHA256

    11724aa93bd21b8641051094e1a24ee57fe46fdd3cbb53d14497689f911ea86e

  • SHA512

    7702f617f19547da7bb63f38c732efcf6b03b59a571be2ef563567e81c11f9f7c9802f2f207c4355d085c07a099723ca8d34aad7acb86e02287d1296fb06fe6a

Malware Config

Targets

    • Target

      11724aa93bd21b8641051094e1a24ee57fe46fdd3cbb53d14497689f911ea86e

    • Size

      100KB

    • MD5

      b24b50554daa566f3917f2ce32946b73

    • SHA1

      1a846ac68bcfb867455f7f466ee72e7084df8016

    • SHA256

      11724aa93bd21b8641051094e1a24ee57fe46fdd3cbb53d14497689f911ea86e

    • SHA512

      7702f617f19547da7bb63f38c732efcf6b03b59a571be2ef563567e81c11f9f7c9802f2f207c4355d085c07a099723ca8d34aad7acb86e02287d1296fb06fe6a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks