General

  • Target

    174f5ffd59d8cbffb38a58cd1fd530a14a19a5deb60987b54cba9a46052c5d36

  • Size

    60KB

  • Sample

    220212-d4rcfafec8

  • MD5

    12d784fbc37637cf833bd595a2fafd06

  • SHA1

    e79effa851ee41fe6745113de308941894b54c9b

  • SHA256

    174f5ffd59d8cbffb38a58cd1fd530a14a19a5deb60987b54cba9a46052c5d36

  • SHA512

    a1e556a3bf94ce6eaf255c6a828f2c30ab83624fd7914f7fc83d08853e4d0cf48ed87245e368283b27e025709558857a2bdc0cde4b4a756b4e750c3f7832aca8

Malware Config

Targets

    • Target

      174f5ffd59d8cbffb38a58cd1fd530a14a19a5deb60987b54cba9a46052c5d36

    • Size

      60KB

    • MD5

      12d784fbc37637cf833bd595a2fafd06

    • SHA1

      e79effa851ee41fe6745113de308941894b54c9b

    • SHA256

      174f5ffd59d8cbffb38a58cd1fd530a14a19a5deb60987b54cba9a46052c5d36

    • SHA512

      a1e556a3bf94ce6eaf255c6a828f2c30ab83624fd7914f7fc83d08853e4d0cf48ed87245e368283b27e025709558857a2bdc0cde4b4a756b4e750c3f7832aca8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks