General

  • Target

    14d8e38b64c972e4e2f85da34035f2eaf389364a03edd56f332310d07696aefd

  • Size

    58KB

  • Sample

    220212-fatxksgah5

  • MD5

    513464eff2cbf2f9c1e04bf1d11cd6b6

  • SHA1

    53e24f3d6f3de786ab910e257a04130523012ca7

  • SHA256

    14d8e38b64c972e4e2f85da34035f2eaf389364a03edd56f332310d07696aefd

  • SHA512

    ef715882fda8aa5e0dbd3c1eade5402956dcc6e46539507564b6c829066c9568100bdbe7f5aca37a0bc7b2e57cbc5a013499cadc8931e7a61397c9c881dc9292

Malware Config

Targets

    • Target

      14d8e38b64c972e4e2f85da34035f2eaf389364a03edd56f332310d07696aefd

    • Size

      58KB

    • MD5

      513464eff2cbf2f9c1e04bf1d11cd6b6

    • SHA1

      53e24f3d6f3de786ab910e257a04130523012ca7

    • SHA256

      14d8e38b64c972e4e2f85da34035f2eaf389364a03edd56f332310d07696aefd

    • SHA512

      ef715882fda8aa5e0dbd3c1eade5402956dcc6e46539507564b6c829066c9568100bdbe7f5aca37a0bc7b2e57cbc5a013499cadc8931e7a61397c9c881dc9292

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks