General

  • Target

    1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84

  • Size

    60KB

  • Sample

    220212-e8jntshfam

  • MD5

    aac634c0fe4a1f400cfcb23eea2aa603

  • SHA1

    b7239a71dcbc7f4bf7390723a972738a17c303d1

  • SHA256

    1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84

  • SHA512

    9c0a63d426deb37bb793115a5de84a862ce7d778c7b17eb6bc7bd95fbb90737588f42ca992c57452c1aafe64cac25c6469feb6b9497e411d64cdbb5e0a80ad60

Malware Config

Targets

    • Target

      1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84

    • Size

      60KB

    • MD5

      aac634c0fe4a1f400cfcb23eea2aa603

    • SHA1

      b7239a71dcbc7f4bf7390723a972738a17c303d1

    • SHA256

      1507909ca7da1a2a47fa228ab78bf5dcfe67efbf59d1c03ba63652ab0e67eb84

    • SHA512

      9c0a63d426deb37bb793115a5de84a862ce7d778c7b17eb6bc7bd95fbb90737588f42ca992c57452c1aafe64cac25c6469feb6b9497e411d64cdbb5e0a80ad60

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks