General

  • Target

    14ca812f1907faf4c07021fc3ff5e399b7add83199555c6c7ed1029c357ab860

  • Size

    101KB

  • Sample

    220212-fbgzeahfdm

  • MD5

    f9d75c234d3881b71151cbbcf50a9a8c

  • SHA1

    1c52807ae89089f8f0d9e4d5f920e5410ef7873d

  • SHA256

    14ca812f1907faf4c07021fc3ff5e399b7add83199555c6c7ed1029c357ab860

  • SHA512

    a3ea21e6bbfa416a5c751d560ebd138760744c1548bd70c5a9ddb46d6fe2baf2059b68808131367828c4729011d5fadd7898ad269210ed494e61a0a10327e390

Malware Config

Targets

    • Target

      14ca812f1907faf4c07021fc3ff5e399b7add83199555c6c7ed1029c357ab860

    • Size

      101KB

    • MD5

      f9d75c234d3881b71151cbbcf50a9a8c

    • SHA1

      1c52807ae89089f8f0d9e4d5f920e5410ef7873d

    • SHA256

      14ca812f1907faf4c07021fc3ff5e399b7add83199555c6c7ed1029c357ab860

    • SHA512

      a3ea21e6bbfa416a5c751d560ebd138760744c1548bd70c5a9ddb46d6fe2baf2059b68808131367828c4729011d5fadd7898ad269210ed494e61a0a10327e390

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks