General

  • Target

    12ba5a39def1b121f7772bd64fe31a7fbc3451888d611af806a777ef0eb10dda

  • Size

    60KB

  • Sample

    220212-f472asaagq

  • MD5

    ba1fce0aefef62b89437d1387b610d9f

  • SHA1

    564ea57583d1597c2600fabfa2346110d6cc0b53

  • SHA256

    12ba5a39def1b121f7772bd64fe31a7fbc3451888d611af806a777ef0eb10dda

  • SHA512

    30cd18f97bcebb85abd666f8c528d0323309208d32a5041ad92c21b0e4181695a21eeb49745d6b40eb4f0e6befd881917e8cdd4cf33f37542bae4755f17c8104

Malware Config

Targets

    • Target

      12ba5a39def1b121f7772bd64fe31a7fbc3451888d611af806a777ef0eb10dda

    • Size

      60KB

    • MD5

      ba1fce0aefef62b89437d1387b610d9f

    • SHA1

      564ea57583d1597c2600fabfa2346110d6cc0b53

    • SHA256

      12ba5a39def1b121f7772bd64fe31a7fbc3451888d611af806a777ef0eb10dda

    • SHA512

      30cd18f97bcebb85abd666f8c528d0323309208d32a5041ad92c21b0e4181695a21eeb49745d6b40eb4f0e6befd881917e8cdd4cf33f37542bae4755f17c8104

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks