General

  • Target

    108c647a1441c9868279a4c0156bc8b06666e93cce4b1c02886636d32e16f3bb

  • Size

    99KB

  • Sample

    220212-gy7c9aghe5

  • MD5

    d83a405dabbfb12b36e1408dd44f1f6a

  • SHA1

    a57543ef36bebb744e56d33afb540c9dadd8e154

  • SHA256

    108c647a1441c9868279a4c0156bc8b06666e93cce4b1c02886636d32e16f3bb

  • SHA512

    767357caafd333cc2d33cbb84acfe96c26e6347086cce1f0afc40030a728e58ea5524748c0a71382d1d18004f08bcd450d181b0dc449bb63d8fc835eacc60dbd

Malware Config

Targets

    • Target

      108c647a1441c9868279a4c0156bc8b06666e93cce4b1c02886636d32e16f3bb

    • Size

      99KB

    • MD5

      d83a405dabbfb12b36e1408dd44f1f6a

    • SHA1

      a57543ef36bebb744e56d33afb540c9dadd8e154

    • SHA256

      108c647a1441c9868279a4c0156bc8b06666e93cce4b1c02886636d32e16f3bb

    • SHA512

      767357caafd333cc2d33cbb84acfe96c26e6347086cce1f0afc40030a728e58ea5524748c0a71382d1d18004f08bcd450d181b0dc449bb63d8fc835eacc60dbd

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks