General

  • Target

    12c7c1c712f75ccc6f783b183e19d54f28cfbcccafe4844a90c2a6fa2cae0fe2

  • Size

    35KB

  • Sample

    220212-f4nyesgdh6

  • MD5

    834d28c2fc069e298617c8c16ab9abe2

  • SHA1

    dc3f8902158d6644bd5178fd55d3a49c296248e7

  • SHA256

    12c7c1c712f75ccc6f783b183e19d54f28cfbcccafe4844a90c2a6fa2cae0fe2

  • SHA512

    9c4f7f63758cca75e222fa395333cbb767f66d4550eebde9c1c97a6511ce111a6ae6a8ba5a003658ce0cd8eefe9e92820d7228cbd7a713443496d53add61f4d1

Malware Config

Targets

    • Target

      12c7c1c712f75ccc6f783b183e19d54f28cfbcccafe4844a90c2a6fa2cae0fe2

    • Size

      35KB

    • MD5

      834d28c2fc069e298617c8c16ab9abe2

    • SHA1

      dc3f8902158d6644bd5178fd55d3a49c296248e7

    • SHA256

      12c7c1c712f75ccc6f783b183e19d54f28cfbcccafe4844a90c2a6fa2cae0fe2

    • SHA512

      9c4f7f63758cca75e222fa395333cbb767f66d4550eebde9c1c97a6511ce111a6ae6a8ba5a003658ce0cd8eefe9e92820d7228cbd7a713443496d53add61f4d1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks