General

  • Target

    10dacb139ff6c0becb3370c87fecd0495ad7ef4b50d019b7140dab1ba165f3f1

  • Size

    216KB

  • Sample

    220212-gt9b2sgha3

  • MD5

    a72f868e694243e5882d5600e50fc315

  • SHA1

    a7c71b5b9e8dbeaf384a787ba5a61e862797d280

  • SHA256

    10dacb139ff6c0becb3370c87fecd0495ad7ef4b50d019b7140dab1ba165f3f1

  • SHA512

    a11dc64a7e7b09d72fb494ab72ddf3b1322aa22ebf2821a6b75e3e3a3978a886436b599cf79d4c4ff4eef68d9d24dfeff13cf4899085ef98484283fb4fb473da

Malware Config

Targets

    • Target

      10dacb139ff6c0becb3370c87fecd0495ad7ef4b50d019b7140dab1ba165f3f1

    • Size

      216KB

    • MD5

      a72f868e694243e5882d5600e50fc315

    • SHA1

      a7c71b5b9e8dbeaf384a787ba5a61e862797d280

    • SHA256

      10dacb139ff6c0becb3370c87fecd0495ad7ef4b50d019b7140dab1ba165f3f1

    • SHA512

      a11dc64a7e7b09d72fb494ab72ddf3b1322aa22ebf2821a6b75e3e3a3978a886436b599cf79d4c4ff4eef68d9d24dfeff13cf4899085ef98484283fb4fb473da

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks