General

  • Target

    b43e87cd35d2ecfe768b328e6033f51c118cbc68bedb6a1ce889aa0e77ad32e3

  • Size

    4.0MB

  • Sample

    220619-xnyalahccl

  • MD5

    35110e35d9e4e4b1afafc169dc3b5b20

  • SHA1

    2d37d8f731fd3c9bf734c77cf6a105962f963d71

  • SHA256

    b43e87cd35d2ecfe768b328e6033f51c118cbc68bedb6a1ce889aa0e77ad32e3

  • SHA512

    723109d5d5ef1be0d64176df3fbebf3fd7d7a8052bce64624b776034e1f1a91afa2283a356ac0e8576ed5b095f4c8423eca17f4d55d5fa735fc204a8b8924bb5

Malware Config

Targets

    • Target

      b43e87cd35d2ecfe768b328e6033f51c118cbc68bedb6a1ce889aa0e77ad32e3

    • Size

      4.0MB

    • MD5

      35110e35d9e4e4b1afafc169dc3b5b20

    • SHA1

      2d37d8f731fd3c9bf734c77cf6a105962f963d71

    • SHA256

      b43e87cd35d2ecfe768b328e6033f51c118cbc68bedb6a1ce889aa0e77ad32e3

    • SHA512

      723109d5d5ef1be0d64176df3fbebf3fd7d7a8052bce64624b776034e1f1a91afa2283a356ac0e8576ed5b095f4c8423eca17f4d55d5fa735fc204a8b8924bb5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks