General

  • Target

    10de64fd2f9ceb40fc85c65310cec1d9f4c3a8b59f1659f2d0eb267f85963589

  • Size

    99KB

  • Sample

    220212-gt28qsadfn

  • MD5

    959da290304866e40b42fdcd88e3c63a

  • SHA1

    e094f29d9502d1c6d373b95ce165e4c2ca26ee6c

  • SHA256

    10de64fd2f9ceb40fc85c65310cec1d9f4c3a8b59f1659f2d0eb267f85963589

  • SHA512

    8cf23e91e64844b40660e3745ff2f75851bfd49ef142b2336bff566854bd3dc960c89a5724e5970660985a2b0dfc23eaed8ab553055e3e3084811824694b843b

Malware Config

Targets

    • Target

      10de64fd2f9ceb40fc85c65310cec1d9f4c3a8b59f1659f2d0eb267f85963589

    • Size

      99KB

    • MD5

      959da290304866e40b42fdcd88e3c63a

    • SHA1

      e094f29d9502d1c6d373b95ce165e4c2ca26ee6c

    • SHA256

      10de64fd2f9ceb40fc85c65310cec1d9f4c3a8b59f1659f2d0eb267f85963589

    • SHA512

      8cf23e91e64844b40660e3745ff2f75851bfd49ef142b2336bff566854bd3dc960c89a5724e5970660985a2b0dfc23eaed8ab553055e3e3084811824694b843b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks