General

  • Target

    15e964caa06b8500ae758f9a2629f7522d929aa04bb2050d20514029ea632885

  • Size

    192KB

  • Sample

    220212-eq4laahdcj

  • MD5

    5e40acad61cccb1d622a7c994c2c8878

  • SHA1

    79ad9b0d3df23e1f14c68e85d861b21681254d8b

  • SHA256

    15e964caa06b8500ae758f9a2629f7522d929aa04bb2050d20514029ea632885

  • SHA512

    dccee79088c3c8934113d3a822cb4030bbf89dc8990a8bd2551870edecf788959f33269f47d280ee4bfa1055ef93686a774e095dd647b9da57d228f00829fa36

Malware Config

Targets

    • Target

      15e964caa06b8500ae758f9a2629f7522d929aa04bb2050d20514029ea632885

    • Size

      192KB

    • MD5

      5e40acad61cccb1d622a7c994c2c8878

    • SHA1

      79ad9b0d3df23e1f14c68e85d861b21681254d8b

    • SHA256

      15e964caa06b8500ae758f9a2629f7522d929aa04bb2050d20514029ea632885

    • SHA512

      dccee79088c3c8934113d3a822cb4030bbf89dc8990a8bd2551870edecf788959f33269f47d280ee4bfa1055ef93686a774e095dd647b9da57d228f00829fa36

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks