General

  • Target

    15f5b4981c650d8c17ef0aaac56c38dea77febf5d5d2a230ef9bb338c7425b5f

  • Size

    191KB

  • Sample

    220212-ep7asafgg9

  • MD5

    d777d183add2435bab8f2679bfb4f6e4

  • SHA1

    62a4dd123853b915b88773b3842e5916890b1f6d

  • SHA256

    15f5b4981c650d8c17ef0aaac56c38dea77febf5d5d2a230ef9bb338c7425b5f

  • SHA512

    0c4dafcd4b3e95eda7df913f63af3cd5c836b14900a02b333790200c7dd88be22cd3972cdc429854296cfa76a1a2551c93072fcbbbeb052f881496516ca49efb

Malware Config

Targets

    • Target

      15f5b4981c650d8c17ef0aaac56c38dea77febf5d5d2a230ef9bb338c7425b5f

    • Size

      191KB

    • MD5

      d777d183add2435bab8f2679bfb4f6e4

    • SHA1

      62a4dd123853b915b88773b3842e5916890b1f6d

    • SHA256

      15f5b4981c650d8c17ef0aaac56c38dea77febf5d5d2a230ef9bb338c7425b5f

    • SHA512

      0c4dafcd4b3e95eda7df913f63af3cd5c836b14900a02b333790200c7dd88be22cd3972cdc429854296cfa76a1a2551c93072fcbbbeb052f881496516ca49efb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks