General

  • Target

    150ef8df506a79bd9260985e338ea11cfe8a600fbb0fa3314bd57d8c12901b5a

  • Size

    60KB

  • Sample

    220212-e78lkagae8

  • MD5

    e51b8309ed3ed32cddd447b9a089b1d8

  • SHA1

    93c54546ce8289f0f6c0b8dd6cecb5e96c1ef3a4

  • SHA256

    150ef8df506a79bd9260985e338ea11cfe8a600fbb0fa3314bd57d8c12901b5a

  • SHA512

    7ef72361ecde2d1106b0c5224965671453e7244d9892ba9ec77591c28141b25e6e01af836f674e6d4abfc8eea42d1b9128c8af02dbebe0127b0566bea100c0e5

Malware Config

Targets

    • Target

      150ef8df506a79bd9260985e338ea11cfe8a600fbb0fa3314bd57d8c12901b5a

    • Size

      60KB

    • MD5

      e51b8309ed3ed32cddd447b9a089b1d8

    • SHA1

      93c54546ce8289f0f6c0b8dd6cecb5e96c1ef3a4

    • SHA256

      150ef8df506a79bd9260985e338ea11cfe8a600fbb0fa3314bd57d8c12901b5a

    • SHA512

      7ef72361ecde2d1106b0c5224965671453e7244d9892ba9ec77591c28141b25e6e01af836f674e6d4abfc8eea42d1b9128c8af02dbebe0127b0566bea100c0e5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks