General

  • Target

    190cb81782e0260af521558fd287eb38d300ead488a8f70f455d4106652e3c18

  • Size

    60KB

  • Sample

    220212-det22agfhn

  • MD5

    79b649d69b334b72d00aeef77002209a

  • SHA1

    edf31f5499771d9a3fd8b8fc54aececff3ae9716

  • SHA256

    190cb81782e0260af521558fd287eb38d300ead488a8f70f455d4106652e3c18

  • SHA512

    66845f57240738316449be40746fe85692ddcf1d6b6d3ca10f8d98307928b3d4ee2aae38ea640b18de8aec2e6095b67f2dc1b93711500550b5f1c345a10e6ffa

Malware Config

Targets

    • Target

      190cb81782e0260af521558fd287eb38d300ead488a8f70f455d4106652e3c18

    • Size

      60KB

    • MD5

      79b649d69b334b72d00aeef77002209a

    • SHA1

      edf31f5499771d9a3fd8b8fc54aececff3ae9716

    • SHA256

      190cb81782e0260af521558fd287eb38d300ead488a8f70f455d4106652e3c18

    • SHA512

      66845f57240738316449be40746fe85692ddcf1d6b6d3ca10f8d98307928b3d4ee2aae38ea640b18de8aec2e6095b67f2dc1b93711500550b5f1c345a10e6ffa

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks