General

  • Target

    35bb955c30c75a0de8121cb2d184ef700bc7a5344bde5ec2369d51099a816c56

  • Size

    4.0MB

  • Sample

    220626-28nn4sgca4

  • MD5

    af6c9cb1a82e93fc7221cddf56493b73

  • SHA1

    524a1a1ab75e45e6cf477dd5696a0079a8a133a5

  • SHA256

    35bb955c30c75a0de8121cb2d184ef700bc7a5344bde5ec2369d51099a816c56

  • SHA512

    ce43b3df187d5f0388ca6ddadb184fe1718621569c1ca9d5e1725fd0f642257cec21ba2be4ed1a852af3f2d58abe48db4c7f225d7ec88ce38270fcea5026437c

Malware Config

Targets

    • Target

      35bb955c30c75a0de8121cb2d184ef700bc7a5344bde5ec2369d51099a816c56

    • Size

      4.0MB

    • MD5

      af6c9cb1a82e93fc7221cddf56493b73

    • SHA1

      524a1a1ab75e45e6cf477dd5696a0079a8a133a5

    • SHA256

      35bb955c30c75a0de8121cb2d184ef700bc7a5344bde5ec2369d51099a816c56

    • SHA512

      ce43b3df187d5f0388ca6ddadb184fe1718621569c1ca9d5e1725fd0f642257cec21ba2be4ed1a852af3f2d58abe48db4c7f225d7ec88ce38270fcea5026437c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks