General

  • Target

    15a313ee3ad70b7fce2de1bad18e3f3d015abb087d80127e1ce114e939f85592

  • Size

    79KB

  • Sample

    220212-ev9cbshdgq

  • MD5

    0bbfcac9118dc7ec439fc54d33f395d1

  • SHA1

    f21dde50bd56587391cd9f081609b8423b2ebf66

  • SHA256

    15a313ee3ad70b7fce2de1bad18e3f3d015abb087d80127e1ce114e939f85592

  • SHA512

    dd765b80a86ab915c1863d4f8cb076464afa9f83322706865cb015764f978828ad6b3ae5f481577029f914827254e6570761f5b50aef019f340c3491120e33d5

Malware Config

Targets

    • Target

      15a313ee3ad70b7fce2de1bad18e3f3d015abb087d80127e1ce114e939f85592

    • Size

      79KB

    • MD5

      0bbfcac9118dc7ec439fc54d33f395d1

    • SHA1

      f21dde50bd56587391cd9f081609b8423b2ebf66

    • SHA256

      15a313ee3ad70b7fce2de1bad18e3f3d015abb087d80127e1ce114e939f85592

    • SHA512

      dd765b80a86ab915c1863d4f8cb076464afa9f83322706865cb015764f978828ad6b3ae5f481577029f914827254e6570761f5b50aef019f340c3491120e33d5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks