General

  • Target

    10de8620de63869a7c494a529289bce52d09057ef8ee475adf78b0c6a559de6b

  • Size

    99KB

  • Sample

    220212-gtz4dagha2

  • MD5

    096cbd7e6acf92f26803dea91a4b0101

  • SHA1

    ff86efc2cc892759276f89d8b160828827d40741

  • SHA256

    10de8620de63869a7c494a529289bce52d09057ef8ee475adf78b0c6a559de6b

  • SHA512

    757ec8a42b3d2cd41acc6174b73190bfae73555816e502112daf061f9b3ff197a8163145a8870f740f33b6064caabec1243d0b122bae781c5989b09d5ca27692

Malware Config

Targets

    • Target

      10de8620de63869a7c494a529289bce52d09057ef8ee475adf78b0c6a559de6b

    • Size

      99KB

    • MD5

      096cbd7e6acf92f26803dea91a4b0101

    • SHA1

      ff86efc2cc892759276f89d8b160828827d40741

    • SHA256

      10de8620de63869a7c494a529289bce52d09057ef8ee475adf78b0c6a559de6b

    • SHA512

      757ec8a42b3d2cd41acc6174b73190bfae73555816e502112daf061f9b3ff197a8163145a8870f740f33b6064caabec1243d0b122bae781c5989b09d5ca27692

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks