General

  • Target

    ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244

  • Size

    101KB

  • Sample

    221013-b4w7ksaeh6

  • MD5

    9136918998cd24a1549e0b9ee1500024

  • SHA1

    69e7a0f7026355e2279e7619a3d2dc375bcaceb2

  • SHA256

    ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244

  • SHA512

    895314a3a3d822e4c938b6a1db0f3dcccab3fa5325b43b4b95f892b0b421ca7df8a3afbedf987e631eb3148bdca5d114c357a7bd560463037b3ffedbcd62368e

  • SSDEEP

    1536:9JbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrGPTEzl:/bfVk29te2jqxCEtg30BibEp

Malware Config

Targets

    • Target

      ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244

    • Size

      101KB

    • MD5

      9136918998cd24a1549e0b9ee1500024

    • SHA1

      69e7a0f7026355e2279e7619a3d2dc375bcaceb2

    • SHA256

      ee18cb59987dc5e62d33ff9c1b6ae9169181b8046732924fa5f12e9c245c8244

    • SHA512

      895314a3a3d822e4c938b6a1db0f3dcccab3fa5325b43b4b95f892b0b421ca7df8a3afbedf987e631eb3148bdca5d114c357a7bd560463037b3ffedbcd62368e

    • SSDEEP

      1536:9JbCiJVkgMaT2itTkjoRXnM48dXFajVPYxCEtkz30rtrGPTEzl:/bfVk29te2jqxCEtg30BibEp

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks