Resubmissions

24-02-2022 11:09

220224-m9mqwaebep 10

29-09-2021 06:53

210929-hnnc3aeabr 8

General

  • Target

    995e26d3c24d06f40dd6771fa55d0127639a50e59249c593cb21ee3ea9401cfa

  • Size

    4.5MB

  • Sample

    220224-m9mqwaebep

  • MD5

    ccdb023db49ef98e92bc4e52fd5d7bec

  • SHA1

    704fe7f943331a69984527e50d3ab1823e111f4b

  • SHA256

    995e26d3c24d06f40dd6771fa55d0127639a50e59249c593cb21ee3ea9401cfa

  • SHA512

    4ce111297c6cdff1377d6eaa9069318ffd7845a4e91ec9bb01488cdef70c5ef292dcb7bb40fff76ff081eaff87e32632bdd4227f0f7c853857da0de4b52e1d29

Malware Config

Targets

    • Target

      995e26d3c24d06f40dd6771fa55d0127639a50e59249c593cb21ee3ea9401cfa

    • Size

      4.5MB

    • MD5

      ccdb023db49ef98e92bc4e52fd5d7bec

    • SHA1

      704fe7f943331a69984527e50d3ab1823e111f4b

    • SHA256

      995e26d3c24d06f40dd6771fa55d0127639a50e59249c593cb21ee3ea9401cfa

    • SHA512

      4ce111297c6cdff1377d6eaa9069318ffd7845a4e91ec9bb01488cdef70c5ef292dcb7bb40fff76ff081eaff87e32632bdd4227f0f7c853857da0de4b52e1d29

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks