General

  • Target

    15adf6fe6e1720c447b05248d52e24a9d1cc222953815b5d5c74f365fe5b44fc

  • Size

    101KB

  • Sample

    220212-eve4gshdfq

  • MD5

    8fa6f528b65d399e5324d93a3dbc77b7

  • SHA1

    d51c6d26c3b95e8834e2ffa02af2a5eba318245e

  • SHA256

    15adf6fe6e1720c447b05248d52e24a9d1cc222953815b5d5c74f365fe5b44fc

  • SHA512

    29dd0a5da826deb2a8703776037116825042fbe631f86027a602bb8a3032780e826fa2af9d475a49680aaff6afefc27ee60b0dbdb5ae407758d1c47cf709756c

Malware Config

Targets

    • Target

      15adf6fe6e1720c447b05248d52e24a9d1cc222953815b5d5c74f365fe5b44fc

    • Size

      101KB

    • MD5

      8fa6f528b65d399e5324d93a3dbc77b7

    • SHA1

      d51c6d26c3b95e8834e2ffa02af2a5eba318245e

    • SHA256

      15adf6fe6e1720c447b05248d52e24a9d1cc222953815b5d5c74f365fe5b44fc

    • SHA512

      29dd0a5da826deb2a8703776037116825042fbe631f86027a602bb8a3032780e826fa2af9d475a49680aaff6afefc27ee60b0dbdb5ae407758d1c47cf709756c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks