General

  • Target

    14ad5859077c88a5058f31235e8760772f1c27acc601e5f9f2f5dc8891cbc702

  • Size

    216KB

  • Sample

    220212-fcqmyagbb4

  • MD5

    ef9c77303b74d2b9a7eadd106bff94d1

  • SHA1

    d1f6c5a3ac2ca149f4cd346c8c71ce1f31d67805

  • SHA256

    14ad5859077c88a5058f31235e8760772f1c27acc601e5f9f2f5dc8891cbc702

  • SHA512

    b89ec8151e4ffea28222d833032162154dcff6e6863654f095c4e29e14a7b2bfbb6dff35d60a77d485862bfae6d93223db69f4b400adf4db17482df62a6898f7

Malware Config

Targets

    • Target

      14ad5859077c88a5058f31235e8760772f1c27acc601e5f9f2f5dc8891cbc702

    • Size

      216KB

    • MD5

      ef9c77303b74d2b9a7eadd106bff94d1

    • SHA1

      d1f6c5a3ac2ca149f4cd346c8c71ce1f31d67805

    • SHA256

      14ad5859077c88a5058f31235e8760772f1c27acc601e5f9f2f5dc8891cbc702

    • SHA512

      b89ec8151e4ffea28222d833032162154dcff6e6863654f095c4e29e14a7b2bfbb6dff35d60a77d485862bfae6d93223db69f4b400adf4db17482df62a6898f7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks