General

  • Target

    112d5055959202cedacbb57bb150e908cecb83921866eb07bc741025d0f6b340

  • Size

    89KB

  • Sample

    220212-gpqn5sggd6

  • MD5

    eb5b1a1b52a1262a9c85e2e8541cfc76

  • SHA1

    6999a7a2a6bbdb7bce25a3219a14280306f13d7c

  • SHA256

    112d5055959202cedacbb57bb150e908cecb83921866eb07bc741025d0f6b340

  • SHA512

    72d6f784daa46b68fc85b6400438ebb07c3e625adae1807d6837cd801b1c355d6354168528f04239da5d2016ec17f82601934f325a2ea104c6595212eb267f42

Malware Config

Targets

    • Target

      112d5055959202cedacbb57bb150e908cecb83921866eb07bc741025d0f6b340

    • Size

      89KB

    • MD5

      eb5b1a1b52a1262a9c85e2e8541cfc76

    • SHA1

      6999a7a2a6bbdb7bce25a3219a14280306f13d7c

    • SHA256

      112d5055959202cedacbb57bb150e908cecb83921866eb07bc741025d0f6b340

    • SHA512

      72d6f784daa46b68fc85b6400438ebb07c3e625adae1807d6837cd801b1c355d6354168528f04239da5d2016ec17f82601934f325a2ea104c6595212eb267f42

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks