General

  • Target

    14e744c9759714fd03ae78d429533bf6b713070c99521a9e07078b4caeb0fc70

  • Size

    80KB

  • Sample

    220212-e9xl3sgag6

  • MD5

    c0d47c2a5429038de9451d5889273865

  • SHA1

    57c45960d162a747a1832acede69a995dc71a43a

  • SHA256

    14e744c9759714fd03ae78d429533bf6b713070c99521a9e07078b4caeb0fc70

  • SHA512

    de88995e06486cea8cca5655f03c4a58146f12c532ce5de650ad1beb722217f3b77555be50887d8ee0f07f98a324c474b5cb0f86443b82dcab109f7410d1fece

Malware Config

Targets

    • Target

      14e744c9759714fd03ae78d429533bf6b713070c99521a9e07078b4caeb0fc70

    • Size

      80KB

    • MD5

      c0d47c2a5429038de9451d5889273865

    • SHA1

      57c45960d162a747a1832acede69a995dc71a43a

    • SHA256

      14e744c9759714fd03ae78d429533bf6b713070c99521a9e07078b4caeb0fc70

    • SHA512

      de88995e06486cea8cca5655f03c4a58146f12c532ce5de650ad1beb722217f3b77555be50887d8ee0f07f98a324c474b5cb0f86443b82dcab109f7410d1fece

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks