General

  • Target

    190b0ee88e4f242de9bb1702809a17954a7b2195c4c8157e169acbd7ab32eab1

  • Size

    36KB

  • Sample

    220212-dezbragfhq

  • MD5

    fda028804ee89f5ada1bd4cb33d242c6

  • SHA1

    dc04f95be741ce51e16523fe0733426871f53279

  • SHA256

    190b0ee88e4f242de9bb1702809a17954a7b2195c4c8157e169acbd7ab32eab1

  • SHA512

    6a2fb247164c81a0ecc1cefab03ff88f8054039b354b7cfdb95fdd60861655f73c3081394280da29d66e7101ebfeb942b4d45dab1b8e88583d17a96a85f3e312

Malware Config

Targets

    • Target

      190b0ee88e4f242de9bb1702809a17954a7b2195c4c8157e169acbd7ab32eab1

    • Size

      36KB

    • MD5

      fda028804ee89f5ada1bd4cb33d242c6

    • SHA1

      dc04f95be741ce51e16523fe0733426871f53279

    • SHA256

      190b0ee88e4f242de9bb1702809a17954a7b2195c4c8157e169acbd7ab32eab1

    • SHA512

      6a2fb247164c81a0ecc1cefab03ff88f8054039b354b7cfdb95fdd60861655f73c3081394280da29d66e7101ebfeb942b4d45dab1b8e88583d17a96a85f3e312

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks