General

  • Target

    MediaCenter.exe

  • Size

    89KB

  • Sample

    221010-gdzgxaahfm

  • MD5

    0f428350ee7737de4590ecb1c1695de9

  • SHA1

    a4c67d71f2f71228289652fc3864d6ac2aababc5

  • SHA256

    271be9c3df89b518eceeb3be77246d48313bd98299f9c5c76b23bc983521bfc1

  • SHA512

    a5224473cf4513545ea60c7dbb1c4ce2ecaa6632cd7f490bf3d1025715c26db2ba10458a6a6666a07ec9b13f74c275a7dab6c012023bd950b295dba2be798838

  • SSDEEP

    1536:voaj1hJL1S9t0MIeboal8bCKxo7h0RP0jwHVz30rtroWuxzuc:Q0hpgz6xGhTjwHN30BE3/

Malware Config

Targets

    • Target

      MediaCenter.exe

    • Size

      89KB

    • MD5

      0f428350ee7737de4590ecb1c1695de9

    • SHA1

      a4c67d71f2f71228289652fc3864d6ac2aababc5

    • SHA256

      271be9c3df89b518eceeb3be77246d48313bd98299f9c5c76b23bc983521bfc1

    • SHA512

      a5224473cf4513545ea60c7dbb1c4ce2ecaa6632cd7f490bf3d1025715c26db2ba10458a6a6666a07ec9b13f74c275a7dab6c012023bd950b295dba2be798838

    • SSDEEP

      1536:voaj1hJL1S9t0MIeboal8bCKxo7h0RP0jwHVz30rtroWuxzuc:Q0hpgz6xGhTjwHN30BE3/

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks