General

  • Target

    167bf87867667400442f3a8eb4c0332a9f02db46f539678b7b9a347fa94ba237

  • Size

    58KB

  • Sample

    220212-egxrdahcbr

  • MD5

    cf88f94bef0601dca7c03b32de2d673c

  • SHA1

    65f21184516fa4693fb9d2076e30abeeff0ce414

  • SHA256

    167bf87867667400442f3a8eb4c0332a9f02db46f539678b7b9a347fa94ba237

  • SHA512

    8a6b7b05cd0c3b86de2fb1733959c099160b13664992883c23e6641669411d31a2d2b9979c3f07227e36f60922c4c5d6e0def577eac65819d0d9b7134e29e99b

Malware Config

Targets

    • Target

      167bf87867667400442f3a8eb4c0332a9f02db46f539678b7b9a347fa94ba237

    • Size

      58KB

    • MD5

      cf88f94bef0601dca7c03b32de2d673c

    • SHA1

      65f21184516fa4693fb9d2076e30abeeff0ce414

    • SHA256

      167bf87867667400442f3a8eb4c0332a9f02db46f539678b7b9a347fa94ba237

    • SHA512

      8a6b7b05cd0c3b86de2fb1733959c099160b13664992883c23e6641669411d31a2d2b9979c3f07227e36f60922c4c5d6e0def577eac65819d0d9b7134e29e99b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks