General

  • Target

    12b686790be4d66639b15cf886254c37c7a4ef3987e73b9a50a6a1a36ab5057e

  • Size

    35KB

  • Sample

    220212-f5efdaaahj

  • MD5

    9061c59e559375ee951dbde0f6867f8f

  • SHA1

    68bfffc371b3aceea6c0cbbed1685f46aee5043d

  • SHA256

    12b686790be4d66639b15cf886254c37c7a4ef3987e73b9a50a6a1a36ab5057e

  • SHA512

    d2ce52dee809c7350274b314cf1d02edfd1bed4d9cdb657cb7cac9027664058a935f439f1d45c8526f65c52d35056873599962b957b16b970f4ad60f84cf46f6

Malware Config

Targets

    • Target

      12b686790be4d66639b15cf886254c37c7a4ef3987e73b9a50a6a1a36ab5057e

    • Size

      35KB

    • MD5

      9061c59e559375ee951dbde0f6867f8f

    • SHA1

      68bfffc371b3aceea6c0cbbed1685f46aee5043d

    • SHA256

      12b686790be4d66639b15cf886254c37c7a4ef3987e73b9a50a6a1a36ab5057e

    • SHA512

      d2ce52dee809c7350274b314cf1d02edfd1bed4d9cdb657cb7cac9027664058a935f439f1d45c8526f65c52d35056873599962b957b16b970f4ad60f84cf46f6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks