General

  • Target

    12f1a9463d80515ce41efe561b5b7042ec9fe518a8228c2886d1f5d20ad43400

  • Size

    192KB

  • Sample

    220212-f2grbsaaek

  • MD5

    8172b21f9e2cf133b3f148aa7baaad05

  • SHA1

    885d84285476ea895917034295a169e40f8057c5

  • SHA256

    12f1a9463d80515ce41efe561b5b7042ec9fe518a8228c2886d1f5d20ad43400

  • SHA512

    d045036ac72cbfb1914e2378febccc3d6c892ad7706ea3d56d70773ad9388cf5646a2b9a77006a0b04c2022b46399f0c0c4de1c159eedcb527b3c571446f00fa

Malware Config

Targets

    • Target

      12f1a9463d80515ce41efe561b5b7042ec9fe518a8228c2886d1f5d20ad43400

    • Size

      192KB

    • MD5

      8172b21f9e2cf133b3f148aa7baaad05

    • SHA1

      885d84285476ea895917034295a169e40f8057c5

    • SHA256

      12f1a9463d80515ce41efe561b5b7042ec9fe518a8228c2886d1f5d20ad43400

    • SHA512

      d045036ac72cbfb1914e2378febccc3d6c892ad7706ea3d56d70773ad9388cf5646a2b9a77006a0b04c2022b46399f0c0c4de1c159eedcb527b3c571446f00fa

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks