General

  • Target

    1708e3af703e92b6479c4f51ef8b72ef83fa6043a116ef2f4adf7abdf16b7a4b

  • Size

    60KB

  • Sample

    220212-d78e5ahbar

  • MD5

    3fc2f2819b63dcd567fd097605ccb041

  • SHA1

    ea328f52f90c304b2776932bd464928bc3d80730

  • SHA256

    1708e3af703e92b6479c4f51ef8b72ef83fa6043a116ef2f4adf7abdf16b7a4b

  • SHA512

    05b1847d27bad5828df9381924267a9a508a23b0ad7ad32fc71b94a33df049ef3577a3d54001b0cb66d716a3232b35789584e49a2e3a54ed8eb903849a74b7d3

Malware Config

Targets

    • Target

      1708e3af703e92b6479c4f51ef8b72ef83fa6043a116ef2f4adf7abdf16b7a4b

    • Size

      60KB

    • MD5

      3fc2f2819b63dcd567fd097605ccb041

    • SHA1

      ea328f52f90c304b2776932bd464928bc3d80730

    • SHA256

      1708e3af703e92b6479c4f51ef8b72ef83fa6043a116ef2f4adf7abdf16b7a4b

    • SHA512

      05b1847d27bad5828df9381924267a9a508a23b0ad7ad32fc71b94a33df049ef3577a3d54001b0cb66d716a3232b35789584e49a2e3a54ed8eb903849a74b7d3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks