General

  • Target

    15edc31aed9cbc777dbe5e6530803721892ef8307eed3fbdbbe0c6d114d527c4

  • Size

    80KB

  • Sample

    220212-eqm9asfgh5

  • MD5

    1e3a0bf04be090d77c4eb1dba6b6c7fc

  • SHA1

    d094de06e72dd84527ad5145fbe975382693e2a0

  • SHA256

    15edc31aed9cbc777dbe5e6530803721892ef8307eed3fbdbbe0c6d114d527c4

  • SHA512

    48f3b4590f5dc6e9abcef5f8a87bff2f38110de61090e8f51724358bbeb23703c73bddba33ed2098ac5c5dc106456d1fab64334e79b1e4756b59dd3bdcbe4457

Malware Config

Targets

    • Target

      15edc31aed9cbc777dbe5e6530803721892ef8307eed3fbdbbe0c6d114d527c4

    • Size

      80KB

    • MD5

      1e3a0bf04be090d77c4eb1dba6b6c7fc

    • SHA1

      d094de06e72dd84527ad5145fbe975382693e2a0

    • SHA256

      15edc31aed9cbc777dbe5e6530803721892ef8307eed3fbdbbe0c6d114d527c4

    • SHA512

      48f3b4590f5dc6e9abcef5f8a87bff2f38110de61090e8f51724358bbeb23703c73bddba33ed2098ac5c5dc106456d1fab64334e79b1e4756b59dd3bdcbe4457

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks