General

  • Target

    835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11

  • Size

    98KB

  • Sample

    221018-sqylxsgedj

  • MD5

    f40ce157c94f1046a38c37bc7a384067

  • SHA1

    2ba16669dd78a42a158cb0b4f58ebe6f1054c998

  • SHA256

    835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11

  • SHA512

    b644ff36e3b31baf4d3552410170ea26c5c6535c41244f908f3aad22eccbbd3dcac02cb79e89f24fd53350a32b8e6c24f73187b41fbf4e131e30ced83ab18083

  • SSDEEP

    1536:XQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrHuxzuK:429DkEGRQixVSjLaes5G30Bod

Malware Config

Targets

    • Target

      835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11

    • Size

      98KB

    • MD5

      f40ce157c94f1046a38c37bc7a384067

    • SHA1

      2ba16669dd78a42a158cb0b4f58ebe6f1054c998

    • SHA256

      835e72ea7ba1ebf75a8fe65508d9d2d704d1118731930fa28c8df82153cddd11

    • SHA512

      b644ff36e3b31baf4d3552410170ea26c5c6535c41244f908f3aad22eccbbd3dcac02cb79e89f24fd53350a32b8e6c24f73187b41fbf4e131e30ced83ab18083

    • SSDEEP

      1536:XQFl29mEkE0L1rDEKrxZKF2zf9g2Pl7W/MwbxMX+ees52z30rtrHuxzuK:429DkEGRQixVSjLaes5G30Bod

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks