General

  • Target

    12ad69d59716f55d90cee5e034092334078e3d58c1023a6cdce3a37d819cbc3d

  • Size

    80KB

  • Sample

    220212-f5xxqagea9

  • MD5

    3771253ee2a38f66628b2906e90ab92e

  • SHA1

    59635f4c8e92789f8c3c8c7d14ce0498ebe89192

  • SHA256

    12ad69d59716f55d90cee5e034092334078e3d58c1023a6cdce3a37d819cbc3d

  • SHA512

    26f6eb244d7abb826611dc79177621c4a788639792929afa26c9ca85b5078e69a1a02aa373a30728fdb3d827049b47ecaf11d19eb1399afdf2a671068829cfef

Malware Config

Targets

    • Target

      12ad69d59716f55d90cee5e034092334078e3d58c1023a6cdce3a37d819cbc3d

    • Size

      80KB

    • MD5

      3771253ee2a38f66628b2906e90ab92e

    • SHA1

      59635f4c8e92789f8c3c8c7d14ce0498ebe89192

    • SHA256

      12ad69d59716f55d90cee5e034092334078e3d58c1023a6cdce3a37d819cbc3d

    • SHA512

      26f6eb244d7abb826611dc79177621c4a788639792929afa26c9ca85b5078e69a1a02aa373a30728fdb3d827049b47ecaf11d19eb1399afdf2a671068829cfef

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks