General

  • Target

    14cfebe929d703332f9469dca7a6e6d720a10170abbff3dc338107a53aaa3717

  • Size

    216KB

  • Sample

    220212-fa2bnagah7

  • MD5

    efdff07fb8c20b30f10dd40d7092d799

  • SHA1

    afc66ce74905484fb662d0c78d8fb9f0777d4f59

  • SHA256

    14cfebe929d703332f9469dca7a6e6d720a10170abbff3dc338107a53aaa3717

  • SHA512

    7308521b7156117289e1bf5ce6a767d0246006d24c2eb933d7d703593bb5feed656fb037fc543b36835a876e63ab245669bb1f21585adc53ba8437bd1d932a04

Malware Config

Targets

    • Target

      14cfebe929d703332f9469dca7a6e6d720a10170abbff3dc338107a53aaa3717

    • Size

      216KB

    • MD5

      efdff07fb8c20b30f10dd40d7092d799

    • SHA1

      afc66ce74905484fb662d0c78d8fb9f0777d4f59

    • SHA256

      14cfebe929d703332f9469dca7a6e6d720a10170abbff3dc338107a53aaa3717

    • SHA512

      7308521b7156117289e1bf5ce6a767d0246006d24c2eb933d7d703593bb5feed656fb037fc543b36835a876e63ab245669bb1f21585adc53ba8437bd1d932a04

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks