General

  • Target

    125c2256d297ca5248637cf64c6e90dfcf04cfcdd09951d679dda1522b30d8b5

  • Size

    58KB

  • Sample

    220212-f9hnlagee4

  • MD5

    c4b9d5cbeeca214c70b01c7790f51720

  • SHA1

    2bde150ed7e0ebbc0c1f2b2702d474ef9d9d3f34

  • SHA256

    125c2256d297ca5248637cf64c6e90dfcf04cfcdd09951d679dda1522b30d8b5

  • SHA512

    91ccb32715340febeabae36860485af8c86ffc86c2a3be8eb4cff843d827843a319e3c31e3c2cb0b7aeb9eb45336642dcef3608cee8b3710d27010fe9debe744

Malware Config

Targets

    • Target

      125c2256d297ca5248637cf64c6e90dfcf04cfcdd09951d679dda1522b30d8b5

    • Size

      58KB

    • MD5

      c4b9d5cbeeca214c70b01c7790f51720

    • SHA1

      2bde150ed7e0ebbc0c1f2b2702d474ef9d9d3f34

    • SHA256

      125c2256d297ca5248637cf64c6e90dfcf04cfcdd09951d679dda1522b30d8b5

    • SHA512

      91ccb32715340febeabae36860485af8c86ffc86c2a3be8eb4cff843d827843a319e3c31e3c2cb0b7aeb9eb45336642dcef3608cee8b3710d27010fe9debe744

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks