General

  • Target

    13036d13dbb70da8e386d7d201d6810ff7725cf594690a80f2b3f633670dca85

  • Size

    92KB

  • Sample

    220212-f1rj5sgde7

  • MD5

    d2d783d3dc4442dc276f1ca97d945d22

  • SHA1

    116121b967b5ae71c625f79c9a7ed91fac3e28ea

  • SHA256

    13036d13dbb70da8e386d7d201d6810ff7725cf594690a80f2b3f633670dca85

  • SHA512

    c8b6bf1edf2fd2833d42674ba00be8972addde8bb28702b566d76ac6a7122817add4ef1e1f754dee36781ea3d6da6634d0d5517a6ad0223a39d2099d79bfe8d9

Malware Config

Targets

    • Target

      13036d13dbb70da8e386d7d201d6810ff7725cf594690a80f2b3f633670dca85

    • Size

      92KB

    • MD5

      d2d783d3dc4442dc276f1ca97d945d22

    • SHA1

      116121b967b5ae71c625f79c9a7ed91fac3e28ea

    • SHA256

      13036d13dbb70da8e386d7d201d6810ff7725cf594690a80f2b3f633670dca85

    • SHA512

      c8b6bf1edf2fd2833d42674ba00be8972addde8bb28702b566d76ac6a7122817add4ef1e1f754dee36781ea3d6da6634d0d5517a6ad0223a39d2099d79bfe8d9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks