General

  • Target

    19286674d63c224124dda8a701d2f91550d50c0d8720f19bae7a1c2b4aede019

  • Size

    35KB

  • Sample

    220212-ddqm8afbd8

  • MD5

    3629acce2110a9bb31cea74dbb3fa598

  • SHA1

    de3b55c44dbe5e3fb3ea3c608d261a31aabdea0c

  • SHA256

    19286674d63c224124dda8a701d2f91550d50c0d8720f19bae7a1c2b4aede019

  • SHA512

    dee01b413ca7b6465aedd594b0efbf98295adae52f4b8f5379caa5f706e26a207872afe1a18847ce530e0382e329d0cb562164112f6d206c0dfa87f917f1ed03

Malware Config

Targets

    • Target

      19286674d63c224124dda8a701d2f91550d50c0d8720f19bae7a1c2b4aede019

    • Size

      35KB

    • MD5

      3629acce2110a9bb31cea74dbb3fa598

    • SHA1

      de3b55c44dbe5e3fb3ea3c608d261a31aabdea0c

    • SHA256

      19286674d63c224124dda8a701d2f91550d50c0d8720f19bae7a1c2b4aede019

    • SHA512

      dee01b413ca7b6465aedd594b0efbf98295adae52f4b8f5379caa5f706e26a207872afe1a18847ce530e0382e329d0cb562164112f6d206c0dfa87f917f1ed03

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks