General

  • Target

    12d46785116dd3466a7585bd0ca9c49b010f7d6d734dd8f241b404de26c65170

  • Size

    36KB

  • Sample

    220212-f3t32sgdg8

  • MD5

    21d07fcf8ade7384b7c65d3f0ccd2429

  • SHA1

    1ea87cc77ac2eb22cf380bbf088bf4ccbfe925e1

  • SHA256

    12d46785116dd3466a7585bd0ca9c49b010f7d6d734dd8f241b404de26c65170

  • SHA512

    4ad4e014bbe519a834d71620a0404921b8453e2a8f375b61b12d79c3edc68b74e0468fa2c608311280e46de106113a57fd2d55d6966e3f5b1e08e46e5fa51177

Malware Config

Targets

    • Target

      12d46785116dd3466a7585bd0ca9c49b010f7d6d734dd8f241b404de26c65170

    • Size

      36KB

    • MD5

      21d07fcf8ade7384b7c65d3f0ccd2429

    • SHA1

      1ea87cc77ac2eb22cf380bbf088bf4ccbfe925e1

    • SHA256

      12d46785116dd3466a7585bd0ca9c49b010f7d6d734dd8f241b404de26c65170

    • SHA512

      4ad4e014bbe519a834d71620a0404921b8453e2a8f375b61b12d79c3edc68b74e0468fa2c608311280e46de106113a57fd2d55d6966e3f5b1e08e46e5fa51177

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks