General

  • Target

    169a10bd6899fd2aea35d9f8bbbb9cea5e4615157d6ea19d92dfab9396aac3f3

  • Size

    35KB

  • Sample

    220212-efdbcahcap

  • MD5

    26c1c14a0b7de64393eced74911013ae

  • SHA1

    81bebe77280dc22c8398f91a05e4a017186fced6

  • SHA256

    169a10bd6899fd2aea35d9f8bbbb9cea5e4615157d6ea19d92dfab9396aac3f3

  • SHA512

    08b084e7f3ead6af1041f86c953070f301cbeb2142ea3c77ef58c30f496f41b8521d31cc1a32ee155dabe501b71a64ee558c4cf8444a7f45645345a43eade6f3

Malware Config

Targets

    • Target

      169a10bd6899fd2aea35d9f8bbbb9cea5e4615157d6ea19d92dfab9396aac3f3

    • Size

      35KB

    • MD5

      26c1c14a0b7de64393eced74911013ae

    • SHA1

      81bebe77280dc22c8398f91a05e4a017186fced6

    • SHA256

      169a10bd6899fd2aea35d9f8bbbb9cea5e4615157d6ea19d92dfab9396aac3f3

    • SHA512

      08b084e7f3ead6af1041f86c953070f301cbeb2142ea3c77ef58c30f496f41b8521d31cc1a32ee155dabe501b71a64ee558c4cf8444a7f45645345a43eade6f3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks