General

  • Target

    1091d02d44cd88f2ac55fdad18b54f742157c3c79d1898fa40c15e8ff56b7a77

  • Size

    176KB

  • Sample

    220212-gyqeqsghd7

  • MD5

    893ccab9662414e2d60e7ca698b51caf

  • SHA1

    3765a5f512f4e4e3a61d4f911c193e0a4a6ddfaa

  • SHA256

    1091d02d44cd88f2ac55fdad18b54f742157c3c79d1898fa40c15e8ff56b7a77

  • SHA512

    c4834e4098deb978546a6a2f35cb3399bf99228f2346980780a0cea5e8c56c0b5b7e5d19d989dea461d1de373211f60d8685a1bdcab47bf6746021fdf4a0b173

Malware Config

Targets

    • Target

      1091d02d44cd88f2ac55fdad18b54f742157c3c79d1898fa40c15e8ff56b7a77

    • Size

      176KB

    • MD5

      893ccab9662414e2d60e7ca698b51caf

    • SHA1

      3765a5f512f4e4e3a61d4f911c193e0a4a6ddfaa

    • SHA256

      1091d02d44cd88f2ac55fdad18b54f742157c3c79d1898fa40c15e8ff56b7a77

    • SHA512

      c4834e4098deb978546a6a2f35cb3399bf99228f2346980780a0cea5e8c56c0b5b7e5d19d989dea461d1de373211f60d8685a1bdcab47bf6746021fdf4a0b173

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks