General

  • Target

    14ee479c6330bd4b9a16ab07de3b91bb5071b2d7c0ebe1cfe6c53731e8ffc29f

  • Size

    99KB

  • Sample

    220212-e9vgqahfbp

  • MD5

    36b3c2565a74b4c077f7e31d582c1491

  • SHA1

    080e4ab9c0801bf1cbdbbd3a374c890375eb0f32

  • SHA256

    14ee479c6330bd4b9a16ab07de3b91bb5071b2d7c0ebe1cfe6c53731e8ffc29f

  • SHA512

    2e492e4385cdd59c298005a0bd7973a2406752b9bfcb6c0858069ad0a41bcc60861f403e9619409cc630b434689aad9fccfcbc79664d05c81a9eea58d3617268

Malware Config

Targets

    • Target

      14ee479c6330bd4b9a16ab07de3b91bb5071b2d7c0ebe1cfe6c53731e8ffc29f

    • Size

      99KB

    • MD5

      36b3c2565a74b4c077f7e31d582c1491

    • SHA1

      080e4ab9c0801bf1cbdbbd3a374c890375eb0f32

    • SHA256

      14ee479c6330bd4b9a16ab07de3b91bb5071b2d7c0ebe1cfe6c53731e8ffc29f

    • SHA512

      2e492e4385cdd59c298005a0bd7973a2406752b9bfcb6c0858069ad0a41bcc60861f403e9619409cc630b434689aad9fccfcbc79664d05c81a9eea58d3617268

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks