General

  • Target

    169a1288ad7747dcf474e61ccf5651dc19fa0f0cb98ac60416e3a9ea22810e03

  • Size

    60KB

  • Sample

    220212-efa6zsfff5

  • MD5

    c8b9733446119687409c49d040b5fa8f

  • SHA1

    515f58cf092b65c2e848edb969def1a8dfe0a357

  • SHA256

    169a1288ad7747dcf474e61ccf5651dc19fa0f0cb98ac60416e3a9ea22810e03

  • SHA512

    04d0829f189f05701b26f43b16a125061080874047a3360ac6912bcae0ca269ee7a136392351ce8c819a14ca4707bb029679f1f0682c4ac4dfd6752dce55fa80

Malware Config

Targets

    • Target

      169a1288ad7747dcf474e61ccf5651dc19fa0f0cb98ac60416e3a9ea22810e03

    • Size

      60KB

    • MD5

      c8b9733446119687409c49d040b5fa8f

    • SHA1

      515f58cf092b65c2e848edb969def1a8dfe0a357

    • SHA256

      169a1288ad7747dcf474e61ccf5651dc19fa0f0cb98ac60416e3a9ea22810e03

    • SHA512

      04d0829f189f05701b26f43b16a125061080874047a3360ac6912bcae0ca269ee7a136392351ce8c819a14ca4707bb029679f1f0682c4ac4dfd6752dce55fa80

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks