General

  • Target

    10e74d32d498d95b157e6984053cb4cf472b8e17437b7d35283dd8f566926271

  • Size

    89KB

  • Sample

    220212-gth5vsggh5

  • MD5

    2824c94dbd4b81ea77fcc98ea503ee57

  • SHA1

    0e0a3c434b800f841ee3bd0eee5b12298dfb35ee

  • SHA256

    10e74d32d498d95b157e6984053cb4cf472b8e17437b7d35283dd8f566926271

  • SHA512

    f64cca3447a02b664eace5315e5d56edd590cdf9cc7727c430138560cac96ee439295556cdd5238b5d08ea0339e68e81863dc8c3d0cd5adefa7a828a9350ef37

Malware Config

Targets

    • Target

      10e74d32d498d95b157e6984053cb4cf472b8e17437b7d35283dd8f566926271

    • Size

      89KB

    • MD5

      2824c94dbd4b81ea77fcc98ea503ee57

    • SHA1

      0e0a3c434b800f841ee3bd0eee5b12298dfb35ee

    • SHA256

      10e74d32d498d95b157e6984053cb4cf472b8e17437b7d35283dd8f566926271

    • SHA512

      f64cca3447a02b664eace5315e5d56edd590cdf9cc7727c430138560cac96ee439295556cdd5238b5d08ea0339e68e81863dc8c3d0cd5adefa7a828a9350ef37

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks