General

  • Target

    00040ad890146e8845022657aade087f11a3c49326cf1ef5475f1ffe919c9213

  • Size

    60KB

  • Sample

    220212-p5btxsceb7

  • MD5

    8ae24c8a2147f2355d97f7b4c4f2b664

  • SHA1

    c394bef7e960d40d692ebebad03ac76a8da177dc

  • SHA256

    00040ad890146e8845022657aade087f11a3c49326cf1ef5475f1ffe919c9213

  • SHA512

    7ffa67ad320ab0d904534a746782013ae51277415730db94a6599346d8dcd42d6894364df0ed85929194664f621c40d5c9966695b7131d4b05dc4ae42c963382

Malware Config

Targets

    • Target

      00040ad890146e8845022657aade087f11a3c49326cf1ef5475f1ffe919c9213

    • Size

      60KB

    • MD5

      8ae24c8a2147f2355d97f7b4c4f2b664

    • SHA1

      c394bef7e960d40d692ebebad03ac76a8da177dc

    • SHA256

      00040ad890146e8845022657aade087f11a3c49326cf1ef5475f1ffe919c9213

    • SHA512

      7ffa67ad320ab0d904534a746782013ae51277415730db94a6599346d8dcd42d6894364df0ed85929194664f621c40d5c9966695b7131d4b05dc4ae42c963382

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Remote System Discovery

1
T1018

Tasks