General

  • Target

    12a384253dbca4ddd9bd5a86f82be985c80f752739aa091ac711e35125d722d7

  • Size

    89KB

  • Sample

    220212-f6dkgageb3

  • MD5

    b1a3df852c8529cf325da4b1b7967e0a

  • SHA1

    02ccdb95080ce95108e8d247d95285722e8b938c

  • SHA256

    12a384253dbca4ddd9bd5a86f82be985c80f752739aa091ac711e35125d722d7

  • SHA512

    39ac6aa040dc8dc91d9b073691b099e421779288d16881f3c4d3ec94c71231150bb5aba96f3c67affed8520982141a76b7d48e1cb312b8c0e7695bfa05b215ca

Malware Config

Targets

    • Target

      12a384253dbca4ddd9bd5a86f82be985c80f752739aa091ac711e35125d722d7

    • Size

      89KB

    • MD5

      b1a3df852c8529cf325da4b1b7967e0a

    • SHA1

      02ccdb95080ce95108e8d247d95285722e8b938c

    • SHA256

      12a384253dbca4ddd9bd5a86f82be985c80f752739aa091ac711e35125d722d7

    • SHA512

      39ac6aa040dc8dc91d9b073691b099e421779288d16881f3c4d3ec94c71231150bb5aba96f3c67affed8520982141a76b7d48e1cb312b8c0e7695bfa05b215ca

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks