General

  • Target

    14f64c05b071f9328b5f0d84e076d135ab57a457de6cb756c8cbecc4b78758da

  • Size

    58KB

  • Sample

    220212-e9nn6sgag3

  • MD5

    e9a043d8372be2fd3af8d51ca125d35a

  • SHA1

    649b4f107294915a34e9d43bd37aa9ca94ba936e

  • SHA256

    14f64c05b071f9328b5f0d84e076d135ab57a457de6cb756c8cbecc4b78758da

  • SHA512

    c3037aee399c178ca528f9463380b14bfce3c834fd9c2afde32ab19c9716717c2792a7166b3f9953aaefbdca3aff79326b8819fe7834077b859dcf262bc93153

Malware Config

Targets

    • Target

      14f64c05b071f9328b5f0d84e076d135ab57a457de6cb756c8cbecc4b78758da

    • Size

      58KB

    • MD5

      e9a043d8372be2fd3af8d51ca125d35a

    • SHA1

      649b4f107294915a34e9d43bd37aa9ca94ba936e

    • SHA256

      14f64c05b071f9328b5f0d84e076d135ab57a457de6cb756c8cbecc4b78758da

    • SHA512

      c3037aee399c178ca528f9463380b14bfce3c834fd9c2afde32ab19c9716717c2792a7166b3f9953aaefbdca3aff79326b8819fe7834077b859dcf262bc93153

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks