General

  • Target

    12d07d5288e029850a63c183e103edc0bbe2caa7021d2f231bd9cfaf28ad3486

  • Size

    60KB

  • Sample

    220212-f38w7saafq

  • MD5

    dcf9df431b54e124b78ead60f6d186aa

  • SHA1

    9595345e2a15ef473a2bd479ace0dbab172745ac

  • SHA256

    12d07d5288e029850a63c183e103edc0bbe2caa7021d2f231bd9cfaf28ad3486

  • SHA512

    cd397e1b9fca30a073427e99297c7c0d9ebbf736e75dcd601806c1d5e0c17596e950568b515d17698fed3726aa2b849e0871ff8837c709c0348459df25ac4eb6

Malware Config

Targets

    • Target

      12d07d5288e029850a63c183e103edc0bbe2caa7021d2f231bd9cfaf28ad3486

    • Size

      60KB

    • MD5

      dcf9df431b54e124b78ead60f6d186aa

    • SHA1

      9595345e2a15ef473a2bd479ace0dbab172745ac

    • SHA256

      12d07d5288e029850a63c183e103edc0bbe2caa7021d2f231bd9cfaf28ad3486

    • SHA512

      cd397e1b9fca30a073427e99297c7c0d9ebbf736e75dcd601806c1d5e0c17596e950568b515d17698fed3726aa2b849e0871ff8837c709c0348459df25ac4eb6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks