General

  • Target

    15ed43d21d6bc4e4231559c4318347743416ee43999aeffff2b9f6701bbc6cf3

  • Size

    192KB

  • Sample

    220212-eqr79ahdbp

  • MD5

    fec2a40cf07c7467696c2845abb20109

  • SHA1

    d2774736d26be90b6936881d9ca4572b44e36646

  • SHA256

    15ed43d21d6bc4e4231559c4318347743416ee43999aeffff2b9f6701bbc6cf3

  • SHA512

    95f1df2012226d286ed09a470f8a060e05b73b21e147a8f0e60ed83e93009abdc6cd57ddb1eab2043ab22b6ddb46325e1c42ad021b17f1869bc119ff4aed5fa9

Malware Config

Targets

    • Target

      15ed43d21d6bc4e4231559c4318347743416ee43999aeffff2b9f6701bbc6cf3

    • Size

      192KB

    • MD5

      fec2a40cf07c7467696c2845abb20109

    • SHA1

      d2774736d26be90b6936881d9ca4572b44e36646

    • SHA256

      15ed43d21d6bc4e4231559c4318347743416ee43999aeffff2b9f6701bbc6cf3

    • SHA512

      95f1df2012226d286ed09a470f8a060e05b73b21e147a8f0e60ed83e93009abdc6cd57ddb1eab2043ab22b6ddb46325e1c42ad021b17f1869bc119ff4aed5fa9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks