General

  • Target

    15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e

  • Size

    36KB

  • Sample

    220212-ey155afhg9

  • MD5

    c81e787a8c97c60470b944bcb80ed88c

  • SHA1

    5f85c6fff679ac44e4c4ffb9ba6bb323e67052ce

  • SHA256

    15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e

  • SHA512

    a6de6db6e2575d45da473d1f6c1a9fa52c3ae80fe6f03fd3409a01e39fd6dc39fa7a2b6579b831dc2131450f0ef8799985e4dbafb4c9f2e2da5317730109fba4

Malware Config

Targets

    • Target

      15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e

    • Size

      36KB

    • MD5

      c81e787a8c97c60470b944bcb80ed88c

    • SHA1

      5f85c6fff679ac44e4c4ffb9ba6bb323e67052ce

    • SHA256

      15730f6481da0ba05002f86ccddd00d0ccdce4a65e8702b4590784850e84943e

    • SHA512

      a6de6db6e2575d45da473d1f6c1a9fa52c3ae80fe6f03fd3409a01e39fd6dc39fa7a2b6579b831dc2131450f0ef8799985e4dbafb4c9f2e2da5317730109fba4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks