General

  • Target

    15e2dcf3581688410688cb4eab5b6933b552868dde6a0df915d8737ad69d2fc4

  • Size

    176KB

  • Sample

    220212-ermzxsfha5

  • MD5

    0c4ff7bc5d60f6c5dbffdaff55451c62

  • SHA1

    cc436a24dc02eff8090e8245c32871a05a1f441d

  • SHA256

    15e2dcf3581688410688cb4eab5b6933b552868dde6a0df915d8737ad69d2fc4

  • SHA512

    d906f43cfbfc1cad8651762424feca5331850877aabeedd0bb43ea82d69d019a7d5b7911a7a55966e633e707d42c781a454437adef6b8ea1f1aacb5a4db97633

Malware Config

Targets

    • Target

      15e2dcf3581688410688cb4eab5b6933b552868dde6a0df915d8737ad69d2fc4

    • Size

      176KB

    • MD5

      0c4ff7bc5d60f6c5dbffdaff55451c62

    • SHA1

      cc436a24dc02eff8090e8245c32871a05a1f441d

    • SHA256

      15e2dcf3581688410688cb4eab5b6933b552868dde6a0df915d8737ad69d2fc4

    • SHA512

      d906f43cfbfc1cad8651762424feca5331850877aabeedd0bb43ea82d69d019a7d5b7911a7a55966e633e707d42c781a454437adef6b8ea1f1aacb5a4db97633

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks