General

  • Target

    10e7e712a73e27c909acd8f7bbf7650ccae8d4d14ba627f6f507c09c118bbb01

  • Size

    88KB

  • Sample

    220212-gtd6xaggh3

  • MD5

    b3e3a29e6fc1894a683d081164163ae2

  • SHA1

    265e3cbae5fa432a01a2a2b5e2fb97ed639a2a26

  • SHA256

    10e7e712a73e27c909acd8f7bbf7650ccae8d4d14ba627f6f507c09c118bbb01

  • SHA512

    67aa72b563e0665de3e4cb2a7f3a8a7d9c6e0a1bb64d488f4e5415831077e77ae3f7c999c64d4aed77ffd824f49546a8b8e7e095bd867d2628d2d1a7efa67721

Malware Config

Targets

    • Target

      10e7e712a73e27c909acd8f7bbf7650ccae8d4d14ba627f6f507c09c118bbb01

    • Size

      88KB

    • MD5

      b3e3a29e6fc1894a683d081164163ae2

    • SHA1

      265e3cbae5fa432a01a2a2b5e2fb97ed639a2a26

    • SHA256

      10e7e712a73e27c909acd8f7bbf7650ccae8d4d14ba627f6f507c09c118bbb01

    • SHA512

      67aa72b563e0665de3e4cb2a7f3a8a7d9c6e0a1bb64d488f4e5415831077e77ae3f7c999c64d4aed77ffd824f49546a8b8e7e095bd867d2628d2d1a7efa67721

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks