General

  • Target

    192edc8f212bf5fc36a6d1e786610d0c78bebc5c7cddfa14194b204b660545a1

  • Size

    58KB

  • Sample

    220212-ddgqbafbd7

  • MD5

    b9b5df548cf3fa86ec7089a085555552

  • SHA1

    c3dbd72b688f937fcec0059e34c09f032b48e0fb

  • SHA256

    192edc8f212bf5fc36a6d1e786610d0c78bebc5c7cddfa14194b204b660545a1

  • SHA512

    919d9d6e4de231d23dddb334f17b3a075e36c0715c80b5caec8cb588f4d2f903bab21594b8a0114938b94a01502ec1271ce99ececd71315570855a468e12b66a

Malware Config

Targets

    • Target

      192edc8f212bf5fc36a6d1e786610d0c78bebc5c7cddfa14194b204b660545a1

    • Size

      58KB

    • MD5

      b9b5df548cf3fa86ec7089a085555552

    • SHA1

      c3dbd72b688f937fcec0059e34c09f032b48e0fb

    • SHA256

      192edc8f212bf5fc36a6d1e786610d0c78bebc5c7cddfa14194b204b660545a1

    • SHA512

      919d9d6e4de231d23dddb334f17b3a075e36c0715c80b5caec8cb588f4d2f903bab21594b8a0114938b94a01502ec1271ce99ececd71315570855a468e12b66a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks