General

  • Target

    12ee1a94dfbba2faa7c56b3ca9d388368b303a0a5a19786cf3993383be6d59d2

  • Size

    176KB

  • Sample

    220212-f2qz1agdf7

  • MD5

    39f214196557fa0552655920e6eee78e

  • SHA1

    5e776e59fff942ccbf11ef57ef640c552e818178

  • SHA256

    12ee1a94dfbba2faa7c56b3ca9d388368b303a0a5a19786cf3993383be6d59d2

  • SHA512

    171fc2760c635c572df5552f0b10abcc78284af3789772b56933aacf7be19a7b11298d10da529ad57929c3e183dda70fec4b6e64c6a770f2c69003b72629ba38

Malware Config

Targets

    • Target

      12ee1a94dfbba2faa7c56b3ca9d388368b303a0a5a19786cf3993383be6d59d2

    • Size

      176KB

    • MD5

      39f214196557fa0552655920e6eee78e

    • SHA1

      5e776e59fff942ccbf11ef57ef640c552e818178

    • SHA256

      12ee1a94dfbba2faa7c56b3ca9d388368b303a0a5a19786cf3993383be6d59d2

    • SHA512

      171fc2760c635c572df5552f0b10abcc78284af3789772b56933aacf7be19a7b11298d10da529ad57929c3e183dda70fec4b6e64c6a770f2c69003b72629ba38

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks