General

  • Target

    34d77df16932f4fd1470e2f9166ce95c1d4999a8b6cc988c4b711ca14fa51d0b

  • Size

    60KB

  • Sample

    220619-ykh7yachh4

  • MD5

    c1d9b7d1050c4057b23fc7d72e12c9ab

  • SHA1

    2d5a7183c81096fbd8ef15db19c54301888c068d

  • SHA256

    34d77df16932f4fd1470e2f9166ce95c1d4999a8b6cc988c4b711ca14fa51d0b

  • SHA512

    44b70795ad63795cf41b8c19d4966477b5debeedc21d8364f492b4291a4220d41423cad867131dfaaa9849d7c9ed12a1e696c076ecec6fa4d8ecb888980c9bb5

Malware Config

Targets

    • Target

      34d77df16932f4fd1470e2f9166ce95c1d4999a8b6cc988c4b711ca14fa51d0b

    • Size

      60KB

    • MD5

      c1d9b7d1050c4057b23fc7d72e12c9ab

    • SHA1

      2d5a7183c81096fbd8ef15db19c54301888c068d

    • SHA256

      34d77df16932f4fd1470e2f9166ce95c1d4999a8b6cc988c4b711ca14fa51d0b

    • SHA512

      44b70795ad63795cf41b8c19d4966477b5debeedc21d8364f492b4291a4220d41423cad867131dfaaa9849d7c9ed12a1e696c076ecec6fa4d8ecb888980c9bb5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks