General

  • Target

    3f4d197fb6e6e53078945860503c423d06a51de68dca2de82da19b99dbbffe5c

  • Size

    60KB

  • Sample

    221019-d2hyaaeed3

  • MD5

    b027d982708c1cca20aea2ef6b598f4f

  • SHA1

    9ebce4a85289ec603bf99d91ad4ad45a22d0d9ee

  • SHA256

    3f4d197fb6e6e53078945860503c423d06a51de68dca2de82da19b99dbbffe5c

  • SHA512

    d3c9e774aef95ff84a8069385aaf4a1936aacfbf4e47b7e75bf1336dbd31e1c15624f8d548caad512cd70063ac52ac3e62d7375ca94017903c890c45fe9889c8

  • SSDEEP

    1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/F:iEoIlwIguEA4c5DgA9DOyq0eFN

Malware Config

Targets

    • Target

      3f4d197fb6e6e53078945860503c423d06a51de68dca2de82da19b99dbbffe5c

    • Size

      60KB

    • MD5

      b027d982708c1cca20aea2ef6b598f4f

    • SHA1

      9ebce4a85289ec603bf99d91ad4ad45a22d0d9ee

    • SHA256

      3f4d197fb6e6e53078945860503c423d06a51de68dca2de82da19b99dbbffe5c

    • SHA512

      d3c9e774aef95ff84a8069385aaf4a1936aacfbf4e47b7e75bf1336dbd31e1c15624f8d548caad512cd70063ac52ac3e62d7375ca94017903c890c45fe9889c8

    • SSDEEP

      1536:iZioIoCwbYP4nuEApQK4TQbtY2gA9DX+ytBO8c3G3eTJ/F:iEoIlwIguEA4c5DgA9DOyq0eFN

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks