General

  • Target

    15fec5c2114e502ebeb84a18de37b6fd382b2c67f47d204fafd32b8b106fbc9e

  • Size

    150KB

  • Sample

    220212-epx24sfgg6

  • MD5

    4b1afc810f7064735de895546a4c43da

  • SHA1

    71f6efbda242e75558c7bc4023157941527b5e04

  • SHA256

    15fec5c2114e502ebeb84a18de37b6fd382b2c67f47d204fafd32b8b106fbc9e

  • SHA512

    5a59fa5bb0ce41b63d108295f8fcffac379aadc8fa1596ac83330a4749a3a06b854e7681da03514ed023905492cd2317f96ceba6a6074fae3bc6d15771de6475

Malware Config

Targets

    • Target

      15fec5c2114e502ebeb84a18de37b6fd382b2c67f47d204fafd32b8b106fbc9e

    • Size

      150KB

    • MD5

      4b1afc810f7064735de895546a4c43da

    • SHA1

      71f6efbda242e75558c7bc4023157941527b5e04

    • SHA256

      15fec5c2114e502ebeb84a18de37b6fd382b2c67f47d204fafd32b8b106fbc9e

    • SHA512

      5a59fa5bb0ce41b63d108295f8fcffac379aadc8fa1596ac83330a4749a3a06b854e7681da03514ed023905492cd2317f96ceba6a6074fae3bc6d15771de6475

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks