General

  • Target

    15401b01b2828ec22a5ba1c7369b9a8011f712c3381a41f89a5091c0457f09bd

  • Size

    192KB

  • Sample

    220212-e3b2ssgac5

  • MD5

    15a746274347c9206bb65e06b48752fc

  • SHA1

    d07627739b7b472d525cb0fc39380268d0e5fedc

  • SHA256

    15401b01b2828ec22a5ba1c7369b9a8011f712c3381a41f89a5091c0457f09bd

  • SHA512

    9b7b39f862fe1fad925dcca6b849d86ea1a879db1a5e09d8ce5f74e3d375f160c1989d2ae90e45168ecee33ccb9a55179a19bdac705893292bc32ff04481ae03

Malware Config

Targets

    • Target

      15401b01b2828ec22a5ba1c7369b9a8011f712c3381a41f89a5091c0457f09bd

    • Size

      192KB

    • MD5

      15a746274347c9206bb65e06b48752fc

    • SHA1

      d07627739b7b472d525cb0fc39380268d0e5fedc

    • SHA256

      15401b01b2828ec22a5ba1c7369b9a8011f712c3381a41f89a5091c0457f09bd

    • SHA512

      9b7b39f862fe1fad925dcca6b849d86ea1a879db1a5e09d8ce5f74e3d375f160c1989d2ae90e45168ecee33ccb9a55179a19bdac705893292bc32ff04481ae03

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks