General

  • Target

    14f74fa8c28c7c415bff98027414eb4fff9761b35d017a754830ee09ff3a2d5d

  • Size

    216KB

  • Sample

    220212-e9ljtagag2

  • MD5

    0e0ddf25b762dbb8c1f7480836aece68

  • SHA1

    a7dd1172cbed45dcc76fdc2251001c04fea11372

  • SHA256

    14f74fa8c28c7c415bff98027414eb4fff9761b35d017a754830ee09ff3a2d5d

  • SHA512

    e2ce4544786c110c0bd4af38cebd8cbd6725e44239c4de180bbfdc0b9ab55949ad51aefb8184e1eeda442d02d1895809efb082130778a0e6e009d8d2732b7829

Malware Config

Targets

    • Target

      14f74fa8c28c7c415bff98027414eb4fff9761b35d017a754830ee09ff3a2d5d

    • Size

      216KB

    • MD5

      0e0ddf25b762dbb8c1f7480836aece68

    • SHA1

      a7dd1172cbed45dcc76fdc2251001c04fea11372

    • SHA256

      14f74fa8c28c7c415bff98027414eb4fff9761b35d017a754830ee09ff3a2d5d

    • SHA512

      e2ce4544786c110c0bd4af38cebd8cbd6725e44239c4de180bbfdc0b9ab55949ad51aefb8184e1eeda442d02d1895809efb082130778a0e6e009d8d2732b7829

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks