General

  • Target

    1151633d67a272faedd9419d5657d3897bcf6f30728befb8ebf2afb91de79fe0

  • Size

    80KB

  • Sample

    220212-gmwglsggb3

  • MD5

    2dd534457d054f649301a9ef83656001

  • SHA1

    dca1f0742ec73f814261a73d42ab0c92d178c22f

  • SHA256

    1151633d67a272faedd9419d5657d3897bcf6f30728befb8ebf2afb91de79fe0

  • SHA512

    b1ae076fa8fa04e27755030113ffc3687e79e8f50dd41b472fa9df4609f6482198c531065620e3efb888e62817b89ed6d9c4216124795b0aae9dcc1265e21f23

Malware Config

Targets

    • Target

      1151633d67a272faedd9419d5657d3897bcf6f30728befb8ebf2afb91de79fe0

    • Size

      80KB

    • MD5

      2dd534457d054f649301a9ef83656001

    • SHA1

      dca1f0742ec73f814261a73d42ab0c92d178c22f

    • SHA256

      1151633d67a272faedd9419d5657d3897bcf6f30728befb8ebf2afb91de79fe0

    • SHA512

      b1ae076fa8fa04e27755030113ffc3687e79e8f50dd41b472fa9df4609f6482198c531065620e3efb888e62817b89ed6d9c4216124795b0aae9dcc1265e21f23

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks