General

  • Target

    165b7ea2fc6de0a36023727942e0038bbd68397b702d2f186a621342fbfb33ac

  • Size

    36KB

  • Sample

    220212-ejtgqshcdp

  • MD5

    78cffa9310e94c40f9d74d2a8ce16f1d

  • SHA1

    94266dd291dd2f2e2249042aac9ad8eb032a1478

  • SHA256

    165b7ea2fc6de0a36023727942e0038bbd68397b702d2f186a621342fbfb33ac

  • SHA512

    cd4391b5141479b3f1a628edfd2b8ad9f23019404380ac5faacac99dd2df2b2640d9c94aa1041076d0b8565e9e1b359a18a87f2fc7fe52e410803ce6ad24e503

Malware Config

Targets

    • Target

      165b7ea2fc6de0a36023727942e0038bbd68397b702d2f186a621342fbfb33ac

    • Size

      36KB

    • MD5

      78cffa9310e94c40f9d74d2a8ce16f1d

    • SHA1

      94266dd291dd2f2e2249042aac9ad8eb032a1478

    • SHA256

      165b7ea2fc6de0a36023727942e0038bbd68397b702d2f186a621342fbfb33ac

    • SHA512

      cd4391b5141479b3f1a628edfd2b8ad9f23019404380ac5faacac99dd2df2b2640d9c94aa1041076d0b8565e9e1b359a18a87f2fc7fe52e410803ce6ad24e503

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks