General

  • Target

    14dc30c9fed1f019f7afb2ab6deabd413bff030f2cbff0d1f5f4924801d9e4a7

  • Size

    35KB

  • Sample

    220212-famhhahfcm

  • MD5

    64cba6f2cb8580cd00bda32d2ed36b03

  • SHA1

    ba4a2eb93517ed9d496bd5794886740b4e58e4cf

  • SHA256

    14dc30c9fed1f019f7afb2ab6deabd413bff030f2cbff0d1f5f4924801d9e4a7

  • SHA512

    e8e4b741d98142d439e716623633a81c6137840127eb2dd2ca081f4f03401e760bb0c7b5a91022a72bf6037fd57fa8c61d48488ed7102b4457fa586753479e55

Malware Config

Targets

    • Target

      14dc30c9fed1f019f7afb2ab6deabd413bff030f2cbff0d1f5f4924801d9e4a7

    • Size

      35KB

    • MD5

      64cba6f2cb8580cd00bda32d2ed36b03

    • SHA1

      ba4a2eb93517ed9d496bd5794886740b4e58e4cf

    • SHA256

      14dc30c9fed1f019f7afb2ab6deabd413bff030f2cbff0d1f5f4924801d9e4a7

    • SHA512

      e8e4b741d98142d439e716623633a81c6137840127eb2dd2ca081f4f03401e760bb0c7b5a91022a72bf6037fd57fa8c61d48488ed7102b4457fa586753479e55

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks