General

  • Target

    9803db9cfd154a6322afc81576fdb9701b28a08dbc62bffc64a5caafb2fc97b7

  • Size

    216KB

  • Sample

    220327-mn12dagef8

  • MD5

    4873fff4c9a6944855c420d8bf981b72

  • SHA1

    beee15bd9233ac621e14b76db0ae9450151df8d0

  • SHA256

    9803db9cfd154a6322afc81576fdb9701b28a08dbc62bffc64a5caafb2fc97b7

  • SHA512

    a6ef75ab081e48f1605a99c70296e276667076e244053255024365cdacbcb2fecf078385254cf451dd7ebffcdfe1b99ef3c604ee80fdc808dbff20ee7ec3ee6a

Malware Config

Targets

    • Target

      9803db9cfd154a6322afc81576fdb9701b28a08dbc62bffc64a5caafb2fc97b7

    • Size

      216KB

    • MD5

      4873fff4c9a6944855c420d8bf981b72

    • SHA1

      beee15bd9233ac621e14b76db0ae9450151df8d0

    • SHA256

      9803db9cfd154a6322afc81576fdb9701b28a08dbc62bffc64a5caafb2fc97b7

    • SHA512

      a6ef75ab081e48f1605a99c70296e276667076e244053255024365cdacbcb2fecf078385254cf451dd7ebffcdfe1b99ef3c604ee80fdc808dbff20ee7ec3ee6a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks