General

  • Target

    14c15011d5c84515b0d6b49428ec5b1cd9cb36d644b40f1d19c55d4878034d80

  • Size

    36KB

  • Sample

    220212-fbyl6agba7

  • MD5

    3471bb17467370d6744dac020e63193d

  • SHA1

    3da121f057cc9bbe6dd82ff4a854249148c9483d

  • SHA256

    14c15011d5c84515b0d6b49428ec5b1cd9cb36d644b40f1d19c55d4878034d80

  • SHA512

    aec3e8780cb8a59558188773e98207daa01c453dc270c8aa6d3afc6d67195783eba5d2b165b8b257ec617674c73682e3f794f813a1399ae353cfa640cb357ab4

Malware Config

Targets

    • Target

      14c15011d5c84515b0d6b49428ec5b1cd9cb36d644b40f1d19c55d4878034d80

    • Size

      36KB

    • MD5

      3471bb17467370d6744dac020e63193d

    • SHA1

      3da121f057cc9bbe6dd82ff4a854249148c9483d

    • SHA256

      14c15011d5c84515b0d6b49428ec5b1cd9cb36d644b40f1d19c55d4878034d80

    • SHA512

      aec3e8780cb8a59558188773e98207daa01c453dc270c8aa6d3afc6d67195783eba5d2b165b8b257ec617674c73682e3f794f813a1399ae353cfa640cb357ab4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks