General

  • Target

    11378f5060d6275dacde98a474fb2fcdb9eb9733f39174985a6d7de0420bd0dc

  • Size

    192KB

  • Sample

    220212-gn77ssggd2

  • MD5

    0b48659caacc097862884c21a5f476c9

  • SHA1

    a73cb5dfc1d600ba4cb00b6f2fe597930315c75b

  • SHA256

    11378f5060d6275dacde98a474fb2fcdb9eb9733f39174985a6d7de0420bd0dc

  • SHA512

    402e7fbb91e51d53e8bf2f9c25dd138b9827cf5d02fb5a1cfd23246c2eece69cd3edcec0b51229afea2cbb3b22580efa91072dddf7733e9bbfe47ae674f0648a

Malware Config

Targets

    • Target

      11378f5060d6275dacde98a474fb2fcdb9eb9733f39174985a6d7de0420bd0dc

    • Size

      192KB

    • MD5

      0b48659caacc097862884c21a5f476c9

    • SHA1

      a73cb5dfc1d600ba4cb00b6f2fe597930315c75b

    • SHA256

      11378f5060d6275dacde98a474fb2fcdb9eb9733f39174985a6d7de0420bd0dc

    • SHA512

      402e7fbb91e51d53e8bf2f9c25dd138b9827cf5d02fb5a1cfd23246c2eece69cd3edcec0b51229afea2cbb3b22580efa91072dddf7733e9bbfe47ae674f0648a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks