General

  • Target

    12ff3d24da11d997fd30340564541b527e64e03f1786c82975acae62a978b70b

  • Size

    79KB

  • Sample

    220212-f1wtvsgde9

  • MD5

    da415534cdf52d56157999455d79983a

  • SHA1

    afeeb6dfc40184c0005e32fc667071e27736bd10

  • SHA256

    12ff3d24da11d997fd30340564541b527e64e03f1786c82975acae62a978b70b

  • SHA512

    2b41466ece3d8e93844691e8ee8a535fa90d67c7e50a2ffb1bbb464bdee703d17fa3654222afbd9714401c528974df31eac39a4f9ceb95e89ddbc58b709d98a1

Malware Config

Targets

    • Target

      12ff3d24da11d997fd30340564541b527e64e03f1786c82975acae62a978b70b

    • Size

      79KB

    • MD5

      da415534cdf52d56157999455d79983a

    • SHA1

      afeeb6dfc40184c0005e32fc667071e27736bd10

    • SHA256

      12ff3d24da11d997fd30340564541b527e64e03f1786c82975acae62a978b70b

    • SHA512

      2b41466ece3d8e93844691e8ee8a535fa90d67c7e50a2ffb1bbb464bdee703d17fa3654222afbd9714401c528974df31eac39a4f9ceb95e89ddbc58b709d98a1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks