General

  • Target

    14628c0dc4aa1e870d5fc84eb0fbf7cb11543628aa06f50bbf8e6ffedcf6a941

  • Size

    99KB

  • Sample

    220212-fe312shfhj

  • MD5

    d165c639f01cb9433571f35b64417a64

  • SHA1

    552ebf9b7e756359e8b6e3986a3852b5325a2bee

  • SHA256

    14628c0dc4aa1e870d5fc84eb0fbf7cb11543628aa06f50bbf8e6ffedcf6a941

  • SHA512

    9465a71b87d69644d772f7396aea9e349213b211f915a6929c3871646cba3359433e21bac4d2bd2791dcd17ef1960966c9a95bae6666116d7ad73280533fb5b6

Malware Config

Targets

    • Target

      14628c0dc4aa1e870d5fc84eb0fbf7cb11543628aa06f50bbf8e6ffedcf6a941

    • Size

      99KB

    • MD5

      d165c639f01cb9433571f35b64417a64

    • SHA1

      552ebf9b7e756359e8b6e3986a3852b5325a2bee

    • SHA256

      14628c0dc4aa1e870d5fc84eb0fbf7cb11543628aa06f50bbf8e6ffedcf6a941

    • SHA512

      9465a71b87d69644d772f7396aea9e349213b211f915a6929c3871646cba3359433e21bac4d2bd2791dcd17ef1960966c9a95bae6666116d7ad73280533fb5b6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks