General

  • Target

    023bc7791450762baaf88f9eef665edf2f7aec44a05020447dd137008035f0e3

  • Size

    192KB

  • Sample

    220212-pdpxgacbc4

  • MD5

    77c286385959c81f3ce25a1c9dcc002f

  • SHA1

    578434c6b1883d00efd77ab4aeb43bec6d933dcd

  • SHA256

    023bc7791450762baaf88f9eef665edf2f7aec44a05020447dd137008035f0e3

  • SHA512

    c976b665b71dca8479f7e31400a97dfd3ecba75814c64c17ccae42c5c9f83eabd70ea87df50312863d45586905d29e389821330cfbe11029da951ef36d4236d6

Malware Config

Targets

    • Target

      023bc7791450762baaf88f9eef665edf2f7aec44a05020447dd137008035f0e3

    • Size

      192KB

    • MD5

      77c286385959c81f3ce25a1c9dcc002f

    • SHA1

      578434c6b1883d00efd77ab4aeb43bec6d933dcd

    • SHA256

      023bc7791450762baaf88f9eef665edf2f7aec44a05020447dd137008035f0e3

    • SHA512

      c976b665b71dca8479f7e31400a97dfd3ecba75814c64c17ccae42c5c9f83eabd70ea87df50312863d45586905d29e389821330cfbe11029da951ef36d4236d6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks