General

  • Target

    022c5accb44e7621db7b6d18d9224ba80a52e884da11bd7eac650dc95368c6a5

  • Size

    99KB

  • Sample

    220212-pd8dtacbd2

  • MD5

    b92fee65026444affe09478f9ebc9bb5

  • SHA1

    bfa0ffaa0428a0174138925ce08dcbe400e4d6e5

  • SHA256

    022c5accb44e7621db7b6d18d9224ba80a52e884da11bd7eac650dc95368c6a5

  • SHA512

    c00e3575f2b80223c770e3d697b23b29912f7be5bc106499fb9e0c79edcb22e38a940179fff4db6dc7c87f754ebda46bfee3806afa5dce3e1238335e1986b3eb

Malware Config

Targets

    • Target

      022c5accb44e7621db7b6d18d9224ba80a52e884da11bd7eac650dc95368c6a5

    • Size

      99KB

    • MD5

      b92fee65026444affe09478f9ebc9bb5

    • SHA1

      bfa0ffaa0428a0174138925ce08dcbe400e4d6e5

    • SHA256

      022c5accb44e7621db7b6d18d9224ba80a52e884da11bd7eac650dc95368c6a5

    • SHA512

      c00e3575f2b80223c770e3d697b23b29912f7be5bc106499fb9e0c79edcb22e38a940179fff4db6dc7c87f754ebda46bfee3806afa5dce3e1238335e1986b3eb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks