General

  • Target

    14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d

  • Size

    36KB

  • Sample

    220212-e9qhrsgag4

  • MD5

    b2435a62310bd15e2a8e9de931bdde90

  • SHA1

    e551cc2496bc54f4783c6b7fdb8967266719fa06

  • SHA256

    14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d

  • SHA512

    cffcd257ca721fea40a5bf67082accad50e2dc0b26f1ae11b3bff0b3fb53c78300265c8c4400a2b249a17aa0e13b30c5d9c28e109463c15b9b23b769562e3497

Malware Config

Targets

    • Target

      14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d

    • Size

      36KB

    • MD5

      b2435a62310bd15e2a8e9de931bdde90

    • SHA1

      e551cc2496bc54f4783c6b7fdb8967266719fa06

    • SHA256

      14f20e47b55b16a22ef0d18691fa7f54491b72159c3733af1cbb74427ca78f9d

    • SHA512

      cffcd257ca721fea40a5bf67082accad50e2dc0b26f1ae11b3bff0b3fb53c78300265c8c4400a2b249a17aa0e13b30c5d9c28e109463c15b9b23b769562e3497

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks