General

  • Target

    0017d00956678c0299447e2568dae8715c26c428b702d6b0c30832065697e9c5

  • Size

    36KB

  • Sample

    220212-p4hk3scea9

  • MD5

    755a0ec4ea5d0e197f371946e79c0fa4

  • SHA1

    8c1624e8e8b6ac4f89377f221101de904a009b8c

  • SHA256

    0017d00956678c0299447e2568dae8715c26c428b702d6b0c30832065697e9c5

  • SHA512

    9f13eeed8ac5541ca535555fa05ce95cbb494df112f7cfe74a69917474cece18a87d11064119da4cc4ffde34701603e0d1e40e4ba310416a7b3a3c3a0717cd81

Malware Config

Targets

    • Target

      0017d00956678c0299447e2568dae8715c26c428b702d6b0c30832065697e9c5

    • Size

      36KB

    • MD5

      755a0ec4ea5d0e197f371946e79c0fa4

    • SHA1

      8c1624e8e8b6ac4f89377f221101de904a009b8c

    • SHA256

      0017d00956678c0299447e2568dae8715c26c428b702d6b0c30832065697e9c5

    • SHA512

      9f13eeed8ac5541ca535555fa05ce95cbb494df112f7cfe74a69917474cece18a87d11064119da4cc4ffde34701603e0d1e40e4ba310416a7b3a3c3a0717cd81

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Tasks