General

  • Target

    15ffba13bfa69def699d25c7ec4b44b0675f148d30b2ffdfb688bdf341c5b118

  • Size

    60KB

  • Sample

    220212-epv8hsfgg5

  • MD5

    c24eeeb38d5c279b011cf4e475be7c63

  • SHA1

    3ceedd2ce52df26ef7ce069e46d257e61f45b0c8

  • SHA256

    15ffba13bfa69def699d25c7ec4b44b0675f148d30b2ffdfb688bdf341c5b118

  • SHA512

    80a46172f5ab3ab3b9c44023ec003f56e169e2d7a8a05261f522e80a8008e6e6395cde9789725df9b05efdb724d83c48b4ddb02ff61aa08ad32b9eab2a101b95

Malware Config

Targets

    • Target

      15ffba13bfa69def699d25c7ec4b44b0675f148d30b2ffdfb688bdf341c5b118

    • Size

      60KB

    • MD5

      c24eeeb38d5c279b011cf4e475be7c63

    • SHA1

      3ceedd2ce52df26ef7ce069e46d257e61f45b0c8

    • SHA256

      15ffba13bfa69def699d25c7ec4b44b0675f148d30b2ffdfb688bdf341c5b118

    • SHA512

      80a46172f5ab3ab3b9c44023ec003f56e169e2d7a8a05261f522e80a8008e6e6395cde9789725df9b05efdb724d83c48b4ddb02ff61aa08ad32b9eab2a101b95

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks