General

  • Target

    10a34b893c70e6edcbd8ebf6bbda480024901bad28a7afcaaace77a4bfbe5de0

  • Size

    216KB

  • Sample

    220212-gxte1aghc8

  • MD5

    f490fd464dc4dce7a02c51b0e59d0c3f

  • SHA1

    a2919988e81a217b97e5402d3efebf374876db4f

  • SHA256

    10a34b893c70e6edcbd8ebf6bbda480024901bad28a7afcaaace77a4bfbe5de0

  • SHA512

    785e1eb7c5f2c80ee95b405cd3a916906019924e914a866ce454d351cdd142f48a69141acf32c8b9623d36e72c96acff309d07e9640daaa0caeaea85ec688d02

Malware Config

Targets

    • Target

      10a34b893c70e6edcbd8ebf6bbda480024901bad28a7afcaaace77a4bfbe5de0

    • Size

      216KB

    • MD5

      f490fd464dc4dce7a02c51b0e59d0c3f

    • SHA1

      a2919988e81a217b97e5402d3efebf374876db4f

    • SHA256

      10a34b893c70e6edcbd8ebf6bbda480024901bad28a7afcaaace77a4bfbe5de0

    • SHA512

      785e1eb7c5f2c80ee95b405cd3a916906019924e914a866ce454d351cdd142f48a69141acf32c8b9623d36e72c96acff309d07e9640daaa0caeaea85ec688d02

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks