General

  • Target

    15e859ef2b3a9956d28887096e987e2bbb49152dea8c03d6f42d0e95a69eca9a

  • Size

    216KB

  • Sample

    220212-erc5qafha2

  • MD5

    1523cd18999c6a67847e1b311690e085

  • SHA1

    c4cbaa205917294eb66d44d81b29e34f8a09766c

  • SHA256

    15e859ef2b3a9956d28887096e987e2bbb49152dea8c03d6f42d0e95a69eca9a

  • SHA512

    60a3e98d378ba7c3e2c7fbd3011a8021ea5975a17cdf0a115a8f7bf3de617c91415b888b5990f1f3472f6ef52d4aad0147b90dc588996764193668d714429574

Malware Config

Targets

    • Target

      15e859ef2b3a9956d28887096e987e2bbb49152dea8c03d6f42d0e95a69eca9a

    • Size

      216KB

    • MD5

      1523cd18999c6a67847e1b311690e085

    • SHA1

      c4cbaa205917294eb66d44d81b29e34f8a09766c

    • SHA256

      15e859ef2b3a9956d28887096e987e2bbb49152dea8c03d6f42d0e95a69eca9a

    • SHA512

      60a3e98d378ba7c3e2c7fbd3011a8021ea5975a17cdf0a115a8f7bf3de617c91415b888b5990f1f3472f6ef52d4aad0147b90dc588996764193668d714429574

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks