General

  • Target

    14c8795fd715db95a076bc2b6a1ae7148344830aebe4ffec27e259065cddca44

  • Size

    60KB

  • Sample

    220212-fbjs1ahfdn

  • MD5

    c4474b8d872545fea30a3933ddf522db

  • SHA1

    43979132be94a415714b9a44324e57b304c8b4d1

  • SHA256

    14c8795fd715db95a076bc2b6a1ae7148344830aebe4ffec27e259065cddca44

  • SHA512

    7beb4b8a827ee55218d0b4b0424a0c4d667cc2072494962ca0bca39b1d542755a91929082021212a74bcb565b3fa2d2994ff70780316861ab5f87b9402350d1f

Malware Config

Targets

    • Target

      14c8795fd715db95a076bc2b6a1ae7148344830aebe4ffec27e259065cddca44

    • Size

      60KB

    • MD5

      c4474b8d872545fea30a3933ddf522db

    • SHA1

      43979132be94a415714b9a44324e57b304c8b4d1

    • SHA256

      14c8795fd715db95a076bc2b6a1ae7148344830aebe4ffec27e259065cddca44

    • SHA512

      7beb4b8a827ee55218d0b4b0424a0c4d667cc2072494962ca0bca39b1d542755a91929082021212a74bcb565b3fa2d2994ff70780316861ab5f87b9402350d1f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks