General

  • Target

    15a0e292d606ee3f89dc3041a4c2bc35de5cc5c6752da48b7ac9d5ae20fd47cc

  • Size

    58KB

  • Sample

    220212-ewhk1afhe4

  • MD5

    066a5f61b3edde9e21e4149210c4f72b

  • SHA1

    236256f15197904f27dbda051796a560561a382c

  • SHA256

    15a0e292d606ee3f89dc3041a4c2bc35de5cc5c6752da48b7ac9d5ae20fd47cc

  • SHA512

    9c180d89db440a8ff905c2922e18ff54309bd98c8ae3e012536b5d4db8896dd8c404896dde5c13d2670a2dc5f584cb2d7a50606fe66b9ca320ce0182055fa9b5

Malware Config

Targets

    • Target

      15a0e292d606ee3f89dc3041a4c2bc35de5cc5c6752da48b7ac9d5ae20fd47cc

    • Size

      58KB

    • MD5

      066a5f61b3edde9e21e4149210c4f72b

    • SHA1

      236256f15197904f27dbda051796a560561a382c

    • SHA256

      15a0e292d606ee3f89dc3041a4c2bc35de5cc5c6752da48b7ac9d5ae20fd47cc

    • SHA512

      9c180d89db440a8ff905c2922e18ff54309bd98c8ae3e012536b5d4db8896dd8c404896dde5c13d2670a2dc5f584cb2d7a50606fe66b9ca320ce0182055fa9b5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks