General

  • Target

    333e9cd3de0e15700879a56cab8582edc58415a6b6e1d99fbeb25a4eb2035634

  • Size

    320KB

  • Sample

    220620-dqefqafag7

  • MD5

    a5dd0f6c8c2ea5f149ed3acc9007ac90

  • SHA1

    ed33315e87f92ac2bce194483c51caa877cb70d6

  • SHA256

    333e9cd3de0e15700879a56cab8582edc58415a6b6e1d99fbeb25a4eb2035634

  • SHA512

    cef10548622a0a47e88fce859e4cd55e01c59d8c3ac490fe8eb59980615ad994f308d15235bfdd8a64af146bef06325cf7bb0128bc7d736e6efa2bdd92fbd879

Malware Config

Targets

    • Target

      333e9cd3de0e15700879a56cab8582edc58415a6b6e1d99fbeb25a4eb2035634

    • Size

      320KB

    • MD5

      a5dd0f6c8c2ea5f149ed3acc9007ac90

    • SHA1

      ed33315e87f92ac2bce194483c51caa877cb70d6

    • SHA256

      333e9cd3de0e15700879a56cab8582edc58415a6b6e1d99fbeb25a4eb2035634

    • SHA512

      cef10548622a0a47e88fce859e4cd55e01c59d8c3ac490fe8eb59980615ad994f308d15235bfdd8a64af146bef06325cf7bb0128bc7d736e6efa2bdd92fbd879

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks