General

  • Target

    149093a34593ae37cd3bb89cb86a56775a9ce0e8f8e42c2217dadd08d56c4d28

  • Size

    58KB

  • Sample

    220212-fdt2rahffn

  • MD5

    2f7a71a51e26767529a4c1f9eccaa080

  • SHA1

    a9980f3138bb78fd6bc90323dc4c91a8fbff37aa

  • SHA256

    149093a34593ae37cd3bb89cb86a56775a9ce0e8f8e42c2217dadd08d56c4d28

  • SHA512

    50ce17151c28f40c07f8307b75058a6ab6b56a6d8414d5ec52de1c9a39e513807c2cbb858e476b6d0974148f39f05df8bbcc29661016b1088e9f505d561f530e

Malware Config

Targets

    • Target

      149093a34593ae37cd3bb89cb86a56775a9ce0e8f8e42c2217dadd08d56c4d28

    • Size

      58KB

    • MD5

      2f7a71a51e26767529a4c1f9eccaa080

    • SHA1

      a9980f3138bb78fd6bc90323dc4c91a8fbff37aa

    • SHA256

      149093a34593ae37cd3bb89cb86a56775a9ce0e8f8e42c2217dadd08d56c4d28

    • SHA512

      50ce17151c28f40c07f8307b75058a6ab6b56a6d8414d5ec52de1c9a39e513807c2cbb858e476b6d0974148f39f05df8bbcc29661016b1088e9f505d561f530e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks