General

  • Target

    194cb19eee281bf9c5ec68f8c02af28bfdd103d1952e7ab5d4e4a808e361ae2e

  • Size

    58KB

  • Sample

    220212-db9nbafbc6

  • MD5

    f92cefd120143642dec344b1ef274b66

  • SHA1

    bd718fb5b00dd59ff62da41438ccdb1dc6ee108b

  • SHA256

    194cb19eee281bf9c5ec68f8c02af28bfdd103d1952e7ab5d4e4a808e361ae2e

  • SHA512

    bde6931b9fe7e2c0bf817c9d3387086e9b85992cc9fede4fb5841acc1bade3a6fd943e09ea07fad9b2c8c50068303dbddd40e048beed79586b3199fe140925c2

Malware Config

Targets

    • Target

      194cb19eee281bf9c5ec68f8c02af28bfdd103d1952e7ab5d4e4a808e361ae2e

    • Size

      58KB

    • MD5

      f92cefd120143642dec344b1ef274b66

    • SHA1

      bd718fb5b00dd59ff62da41438ccdb1dc6ee108b

    • SHA256

      194cb19eee281bf9c5ec68f8c02af28bfdd103d1952e7ab5d4e4a808e361ae2e

    • SHA512

      bde6931b9fe7e2c0bf817c9d3387086e9b85992cc9fede4fb5841acc1bade3a6fd943e09ea07fad9b2c8c50068303dbddd40e048beed79586b3199fe140925c2

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks