General

  • Target

    0022a144f0296ebf6dbb98e7e044cd4f94e564e8c2aae9962e5067b5c0184631

  • Size

    79KB

  • Sample

    220212-p3284aecck

  • MD5

    7bb3b9fe1fe7b08d00ea1f008f7539ac

  • SHA1

    acdaa49d374fc331729d0bf7b96d0e08ec8a74a8

  • SHA256

    0022a144f0296ebf6dbb98e7e044cd4f94e564e8c2aae9962e5067b5c0184631

  • SHA512

    d88dccb034a76838f765cd72093f34f7985a856ea17995de8e2a3bf59c51145eb3682a873145558f6b8f676a432132f6c50cef6ace1b545d55ef740f2ed677bd

Malware Config

Targets

    • Target

      0022a144f0296ebf6dbb98e7e044cd4f94e564e8c2aae9962e5067b5c0184631

    • Size

      79KB

    • MD5

      7bb3b9fe1fe7b08d00ea1f008f7539ac

    • SHA1

      acdaa49d374fc331729d0bf7b96d0e08ec8a74a8

    • SHA256

      0022a144f0296ebf6dbb98e7e044cd4f94e564e8c2aae9962e5067b5c0184631

    • SHA512

      d88dccb034a76838f765cd72093f34f7985a856ea17995de8e2a3bf59c51145eb3682a873145558f6b8f676a432132f6c50cef6ace1b545d55ef740f2ed677bd

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks