General

  • Target

    028632c8efe9ccd50b46e7b99609679343e864cdb390e86e988cd4a0a5933811

  • Size

    99KB

  • Sample

    220212-n81f1sdgen

  • MD5

    f26ed86a57cdc02819937eb27331a4c6

  • SHA1

    2f7e0aa9fc12e35c8d470f65efd096b9318ea557

  • SHA256

    028632c8efe9ccd50b46e7b99609679343e864cdb390e86e988cd4a0a5933811

  • SHA512

    98c582994983f440f8c59aa864c408f0320bc367e25a28427d41ba2a41a0e7da7e9b8f88ada12c49944f9497bb9e7634eb0d655096ae2deb1e263256a06d43e1

Malware Config

Targets

    • Target

      028632c8efe9ccd50b46e7b99609679343e864cdb390e86e988cd4a0a5933811

    • Size

      99KB

    • MD5

      f26ed86a57cdc02819937eb27331a4c6

    • SHA1

      2f7e0aa9fc12e35c8d470f65efd096b9318ea557

    • SHA256

      028632c8efe9ccd50b46e7b99609679343e864cdb390e86e988cd4a0a5933811

    • SHA512

      98c582994983f440f8c59aa864c408f0320bc367e25a28427d41ba2a41a0e7da7e9b8f88ada12c49944f9497bb9e7634eb0d655096ae2deb1e263256a06d43e1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks