General

  • Target

    10c9514b3952d8fb8ee50dd300df804ed7f14170ae322ea697e19678cf06ec54

  • Size

    109KB

  • Sample

    220212-gvtmzsgha8

  • MD5

    e145ad4521e86dc11eda42f20f36c8ee

  • SHA1

    6c0b56c0671033e73700909ca1a0cf9a53fb74ac

  • SHA256

    10c9514b3952d8fb8ee50dd300df804ed7f14170ae322ea697e19678cf06ec54

  • SHA512

    2bda7f931fd788ffa8a25d8dea0a420dad307c692291b914bc6946c30870041cd6155d581013ce9e435077d7b3f1f0c00bcd2d248e52f0ce376c9b16e596b542

Malware Config

Targets

    • Target

      10c9514b3952d8fb8ee50dd300df804ed7f14170ae322ea697e19678cf06ec54

    • Size

      109KB

    • MD5

      e145ad4521e86dc11eda42f20f36c8ee

    • SHA1

      6c0b56c0671033e73700909ca1a0cf9a53fb74ac

    • SHA256

      10c9514b3952d8fb8ee50dd300df804ed7f14170ae322ea697e19678cf06ec54

    • SHA512

      2bda7f931fd788ffa8a25d8dea0a420dad307c692291b914bc6946c30870041cd6155d581013ce9e435077d7b3f1f0c00bcd2d248e52f0ce376c9b16e596b542

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks