General

  • Target

    185cb7add5be3c9fcc174ffaca55c716803a2b67f110cb987ed711dd58c6c42f

  • Size

    60KB

  • Sample

    220212-dp65caghan

  • MD5

    85d2b2ed3fc70df7d2ecc164a2d662d0

  • SHA1

    ce69d3864cae7ead18ce4de998ee4b715976946d

  • SHA256

    185cb7add5be3c9fcc174ffaca55c716803a2b67f110cb987ed711dd58c6c42f

  • SHA512

    98d529fb574f72e231c09cb86e29568ce5fde27723e352c0642a4bd5818b1b4683714b04775042181366f80493cabecdc8f6abe3a358a494d47ab60619a0fe7b

Malware Config

Targets

    • Target

      185cb7add5be3c9fcc174ffaca55c716803a2b67f110cb987ed711dd58c6c42f

    • Size

      60KB

    • MD5

      85d2b2ed3fc70df7d2ecc164a2d662d0

    • SHA1

      ce69d3864cae7ead18ce4de998ee4b715976946d

    • SHA256

      185cb7add5be3c9fcc174ffaca55c716803a2b67f110cb987ed711dd58c6c42f

    • SHA512

      98d529fb574f72e231c09cb86e29568ce5fde27723e352c0642a4bd5818b1b4683714b04775042181366f80493cabecdc8f6abe3a358a494d47ab60619a0fe7b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks