General

  • Target

    12b93e7d210b951708efd0f543a0b9f6d4640387240dbad10c0bb30508413fdd

  • Size

    104KB

  • Sample

    220212-f496naaagr

  • MD5

    b9046eef3920b13890d0b7cfd70beb89

  • SHA1

    303f5916c891481e38eb25219671c8b6c72f63eb

  • SHA256

    12b93e7d210b951708efd0f543a0b9f6d4640387240dbad10c0bb30508413fdd

  • SHA512

    a19259ff9124ed6f35429b0cd901cb83c3fe3e2c188cffad3c204cf6e301d6978d3fb883e6132e65dc54028c34d45b8f9c333135dfd15f22c741585a2b4246f0

Malware Config

Targets

    • Target

      12b93e7d210b951708efd0f543a0b9f6d4640387240dbad10c0bb30508413fdd

    • Size

      104KB

    • MD5

      b9046eef3920b13890d0b7cfd70beb89

    • SHA1

      303f5916c891481e38eb25219671c8b6c72f63eb

    • SHA256

      12b93e7d210b951708efd0f543a0b9f6d4640387240dbad10c0bb30508413fdd

    • SHA512

      a19259ff9124ed6f35429b0cd901cb83c3fe3e2c188cffad3c204cf6e301d6978d3fb883e6132e65dc54028c34d45b8f9c333135dfd15f22c741585a2b4246f0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks