General

  • Target

    18c0f95de7f3f8896de8e231fc8d8319807e1ad631421070d7c7b91fe3d7d78c

  • Size

    36KB

  • Sample

    220212-djhvkaggdl

  • MD5

    ed823cf6931dc8525969f4c50a91ed9d

  • SHA1

    1e50bf5ab8d3335381480a2af9bed5cec387f9c7

  • SHA256

    18c0f95de7f3f8896de8e231fc8d8319807e1ad631421070d7c7b91fe3d7d78c

  • SHA512

    bbc598b63cacd9fac97b330d289d168b166698aef57a6e61eb64ce3bcfcf261beb14068495d2fac8449268fa17b565879a090abe547944e4c8d7a8b23ab97c3e

Malware Config

Targets

    • Target

      18c0f95de7f3f8896de8e231fc8d8319807e1ad631421070d7c7b91fe3d7d78c

    • Size

      36KB

    • MD5

      ed823cf6931dc8525969f4c50a91ed9d

    • SHA1

      1e50bf5ab8d3335381480a2af9bed5cec387f9c7

    • SHA256

      18c0f95de7f3f8896de8e231fc8d8319807e1ad631421070d7c7b91fe3d7d78c

    • SHA512

      bbc598b63cacd9fac97b330d289d168b166698aef57a6e61eb64ce3bcfcf261beb14068495d2fac8449268fa17b565879a090abe547944e4c8d7a8b23ab97c3e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks