General

  • Target

    1125fbaff134ec275e5ecc85a9adabaea184a7abf46499ef0afbd8cfd83ecb8b

  • Size

    88KB

  • Sample

    220212-gp9f9aggd9

  • MD5

    ca3ba7c6aa4dd9ea45fe2071d9f950ca

  • SHA1

    61ff2e5897f98ced1034303d6a7c3249549d6959

  • SHA256

    1125fbaff134ec275e5ecc85a9adabaea184a7abf46499ef0afbd8cfd83ecb8b

  • SHA512

    d1e74d377da7fb10e26ced74670795a6069288c2d198dccb3ccd230ec44dba24e154082094c1fa316f1e7c295b8929d7e0a00e72b577f100804467417717a312

Malware Config

Targets

    • Target

      1125fbaff134ec275e5ecc85a9adabaea184a7abf46499ef0afbd8cfd83ecb8b

    • Size

      88KB

    • MD5

      ca3ba7c6aa4dd9ea45fe2071d9f950ca

    • SHA1

      61ff2e5897f98ced1034303d6a7c3249549d6959

    • SHA256

      1125fbaff134ec275e5ecc85a9adabaea184a7abf46499ef0afbd8cfd83ecb8b

    • SHA512

      d1e74d377da7fb10e26ced74670795a6069288c2d198dccb3ccd230ec44dba24e154082094c1fa316f1e7c295b8929d7e0a00e72b577f100804467417717a312

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks