General

  • Target

    1615ea84310cb6f8788933ed518760e96c65dfe67d7d8ee19bac5a1070f82121

  • Size

    60KB

  • Sample

    220212-enkqdsfgf3

  • MD5

    e52197ffdae4d4a57bf003243754c33d

  • SHA1

    2667e2fff36e062a4c25b3d9b21415166e203e35

  • SHA256

    1615ea84310cb6f8788933ed518760e96c65dfe67d7d8ee19bac5a1070f82121

  • SHA512

    eb973d82db29226240300e3431e93f5c9d9d0f491e29fb40fe80b9cc16da10b9c889645dfd7fc501211ffe7f2710b4e7b549a38bb48012869c4e7c4cbd9deefd

Malware Config

Targets

    • Target

      1615ea84310cb6f8788933ed518760e96c65dfe67d7d8ee19bac5a1070f82121

    • Size

      60KB

    • MD5

      e52197ffdae4d4a57bf003243754c33d

    • SHA1

      2667e2fff36e062a4c25b3d9b21415166e203e35

    • SHA256

      1615ea84310cb6f8788933ed518760e96c65dfe67d7d8ee19bac5a1070f82121

    • SHA512

      eb973d82db29226240300e3431e93f5c9d9d0f491e29fb40fe80b9cc16da10b9c889645dfd7fc501211ffe7f2710b4e7b549a38bb48012869c4e7c4cbd9deefd

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks