General

  • Target

    02157f8f52ad3087fa6f3701cd13c912cfb3d15253dcef815742f04edd52ae41

  • Size

    191KB

  • Sample

    220212-pe6xdadhdk

  • MD5

    d08de78c49cf972a0da6d014773b1fd9

  • SHA1

    7a9a743d346492ccbe33f55f00c35db5138f42e0

  • SHA256

    02157f8f52ad3087fa6f3701cd13c912cfb3d15253dcef815742f04edd52ae41

  • SHA512

    aec43cb673af85e30ed6683d8a9364204ad94fd3469815a4c87934342521828e79ed22dc7c537a77f37192ff5bff099124da40d5033c8c6bbe9b7cb8e9bc8c96

Malware Config

Targets

    • Target

      02157f8f52ad3087fa6f3701cd13c912cfb3d15253dcef815742f04edd52ae41

    • Size

      191KB

    • MD5

      d08de78c49cf972a0da6d014773b1fd9

    • SHA1

      7a9a743d346492ccbe33f55f00c35db5138f42e0

    • SHA256

      02157f8f52ad3087fa6f3701cd13c912cfb3d15253dcef815742f04edd52ae41

    • SHA512

      aec43cb673af85e30ed6683d8a9364204ad94fd3469815a4c87934342521828e79ed22dc7c537a77f37192ff5bff099124da40d5033c8c6bbe9b7cb8e9bc8c96

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks