General

  • Target

    10a0d59b4fc6480c834cb39c8648ab8c59709893cd6c0af9497551e880412de3

  • Size

    80KB

  • Sample

    220212-gxypqaaean

  • MD5

    aa43abf989806ae27d47705849dea25c

  • SHA1

    e0877d72feecc9ce729f7a9510d3ff683c2a4fa4

  • SHA256

    10a0d59b4fc6480c834cb39c8648ab8c59709893cd6c0af9497551e880412de3

  • SHA512

    4f7c11f37134086d3eecc022f72669e7239c540c9d807fbd86ca9a256e60b5527e3fb137f472e8833711631429159a01a2d4ab8e996c65915dad554a1875e6d5

Malware Config

Targets

    • Target

      10a0d59b4fc6480c834cb39c8648ab8c59709893cd6c0af9497551e880412de3

    • Size

      80KB

    • MD5

      aa43abf989806ae27d47705849dea25c

    • SHA1

      e0877d72feecc9ce729f7a9510d3ff683c2a4fa4

    • SHA256

      10a0d59b4fc6480c834cb39c8648ab8c59709893cd6c0af9497551e880412de3

    • SHA512

      4f7c11f37134086d3eecc022f72669e7239c540c9d807fbd86ca9a256e60b5527e3fb137f472e8833711631429159a01a2d4ab8e996c65915dad554a1875e6d5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks