General

  • Target

    14acb4eb5b7f5c1d38e81846736ce34bda40ebfca708c731d16b7389afdf6715

  • Size

    99KB

  • Sample

    220212-fcssasgbb5

  • MD5

    011875d3ad29c037fa7e3bb28025f500

  • SHA1

    c293041014e54e3d7429164387d1d5c00fc47f5e

  • SHA256

    14acb4eb5b7f5c1d38e81846736ce34bda40ebfca708c731d16b7389afdf6715

  • SHA512

    704fa167b4d3ed29998fbf03f86604206502dcc39834fce3cf71da0b1c13a88f3671241e23689272ebb5e820bdccbbc63771901197c162d28f50a5d0b1a79b09

Malware Config

Targets

    • Target

      14acb4eb5b7f5c1d38e81846736ce34bda40ebfca708c731d16b7389afdf6715

    • Size

      99KB

    • MD5

      011875d3ad29c037fa7e3bb28025f500

    • SHA1

      c293041014e54e3d7429164387d1d5c00fc47f5e

    • SHA256

      14acb4eb5b7f5c1d38e81846736ce34bda40ebfca708c731d16b7389afdf6715

    • SHA512

      704fa167b4d3ed29998fbf03f86604206502dcc39834fce3cf71da0b1c13a88f3671241e23689272ebb5e820bdccbbc63771901197c162d28f50a5d0b1a79b09

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks