General

  • Target

    1678d418c66e87bdd81ae93fe39f3c3b513d85b0cc69655b2e7c0904b8589930

  • Size

    36KB

  • Sample

    220212-eg46fsffh8

  • MD5

    c7677230844affd49a3e0353743879fd

  • SHA1

    349e7ea4ac43681da51bed8812c08453ae71ac39

  • SHA256

    1678d418c66e87bdd81ae93fe39f3c3b513d85b0cc69655b2e7c0904b8589930

  • SHA512

    0f9076f2baead64c2545b335d11a952a9ab92bb9427f7e5335bc3c2aa62bc345e30cc334b8d044e9cf3d2bc3a0933e72f36ab73a2208aba8471ae58ee9abc51d

Malware Config

Targets

    • Target

      1678d418c66e87bdd81ae93fe39f3c3b513d85b0cc69655b2e7c0904b8589930

    • Size

      36KB

    • MD5

      c7677230844affd49a3e0353743879fd

    • SHA1

      349e7ea4ac43681da51bed8812c08453ae71ac39

    • SHA256

      1678d418c66e87bdd81ae93fe39f3c3b513d85b0cc69655b2e7c0904b8589930

    • SHA512

      0f9076f2baead64c2545b335d11a952a9ab92bb9427f7e5335bc3c2aa62bc345e30cc334b8d044e9cf3d2bc3a0933e72f36ab73a2208aba8471ae58ee9abc51d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks