General

  • Target

    2b219ee94ccd3dab012a2a6f5b55e4dde7f0e14d4df72caa6bc650c53ca1c0c1

  • Size

    152KB

  • Sample

    220323-s97zpsgef5

  • MD5

    f7472ef3bf3eec34a8503a80c264a71d

  • SHA1

    ce6c4e674052635bc019ef58e6da6873495d67dc

  • SHA256

    2b219ee94ccd3dab012a2a6f5b55e4dde7f0e14d4df72caa6bc650c53ca1c0c1

  • SHA512

    cd9c97347ff5f18a94aeb03a120eff7df189d6f4b5da2d42864b995b5ff2fbc2e121076bcea37c218bbe2323a07dc4f46417d244e2220a590bffed3c353b95e8

Malware Config

Targets

    • Target

      2b219ee94ccd3dab012a2a6f5b55e4dde7f0e14d4df72caa6bc650c53ca1c0c1

    • Size

      152KB

    • MD5

      f7472ef3bf3eec34a8503a80c264a71d

    • SHA1

      ce6c4e674052635bc019ef58e6da6873495d67dc

    • SHA256

      2b219ee94ccd3dab012a2a6f5b55e4dde7f0e14d4df72caa6bc650c53ca1c0c1

    • SHA512

      cd9c97347ff5f18a94aeb03a120eff7df189d6f4b5da2d42864b995b5ff2fbc2e121076bcea37c218bbe2323a07dc4f46417d244e2220a590bffed3c353b95e8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks