General

  • Target

    15b7caa9487dcafb5ee66b555251c3d16b656cb813c3414671553d741b414bd9

  • Size

    35KB

  • Sample

    220212-et6vtahdfn

  • MD5

    1673e3b6125ed243dfbc5f35e0530d76

  • SHA1

    c3a9e38953a2fb84189037259a8de7b6b179ccdb

  • SHA256

    15b7caa9487dcafb5ee66b555251c3d16b656cb813c3414671553d741b414bd9

  • SHA512

    8e457c72a6e725519bf9a0eaf0465aa5ca91f4b57868a482fdff69da332508dd2ac9540db97218aab9fb4d027dfa991e0360b4e37512cc9d38d9e512bbb72a4e

Malware Config

Targets

    • Target

      15b7caa9487dcafb5ee66b555251c3d16b656cb813c3414671553d741b414bd9

    • Size

      35KB

    • MD5

      1673e3b6125ed243dfbc5f35e0530d76

    • SHA1

      c3a9e38953a2fb84189037259a8de7b6b179ccdb

    • SHA256

      15b7caa9487dcafb5ee66b555251c3d16b656cb813c3414671553d741b414bd9

    • SHA512

      8e457c72a6e725519bf9a0eaf0465aa5ca91f4b57868a482fdff69da332508dd2ac9540db97218aab9fb4d027dfa991e0360b4e37512cc9d38d9e512bbb72a4e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks