General

  • Target

    12b144a2f3c061a452c654b8a86fd04852f70872bbc99154aac554e705f5157b

  • Size

    101KB

  • Sample

    220212-f5jebsgea4

  • MD5

    d79eaa0ec25b93e64b64fa617c23ae66

  • SHA1

    1f8f364eb53ecd54c1064ebb33ca7354b1202c9e

  • SHA256

    12b144a2f3c061a452c654b8a86fd04852f70872bbc99154aac554e705f5157b

  • SHA512

    6fd6842af6dc3287ad65f56fea9eb0c9082285d5e14806494d49973538c081fa37a801a430faa80a4cbbaa16b47886f8bebc051755a6d29498aa6c89211b2dcb

Malware Config

Targets

    • Target

      12b144a2f3c061a452c654b8a86fd04852f70872bbc99154aac554e705f5157b

    • Size

      101KB

    • MD5

      d79eaa0ec25b93e64b64fa617c23ae66

    • SHA1

      1f8f364eb53ecd54c1064ebb33ca7354b1202c9e

    • SHA256

      12b144a2f3c061a452c654b8a86fd04852f70872bbc99154aac554e705f5157b

    • SHA512

      6fd6842af6dc3287ad65f56fea9eb0c9082285d5e14806494d49973538c081fa37a801a430faa80a4cbbaa16b47886f8bebc051755a6d29498aa6c89211b2dcb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks