General

  • Target

    14541bc6ebc867669a8d89a2acd37f57ed932b484ebfa2400b853748da79090c

  • Size

    101KB

  • Sample

    220212-ffq3wagbe3

  • MD5

    e5c8f39466b7e7343bd17daf0a0baa29

  • SHA1

    c40dd448870a1bcdf6ff1edaa5a0bb99768aed35

  • SHA256

    14541bc6ebc867669a8d89a2acd37f57ed932b484ebfa2400b853748da79090c

  • SHA512

    8eab8ea899ebe3edf5b5e2dbaf0924291fac056a5fc71bc79ef829f8a92263aacf174046d9de4371bcb7647c6897f5330bd1769b02dcc3605fb50cd1a47b0e25

Malware Config

Targets

    • Target

      14541bc6ebc867669a8d89a2acd37f57ed932b484ebfa2400b853748da79090c

    • Size

      101KB

    • MD5

      e5c8f39466b7e7343bd17daf0a0baa29

    • SHA1

      c40dd448870a1bcdf6ff1edaa5a0bb99768aed35

    • SHA256

      14541bc6ebc867669a8d89a2acd37f57ed932b484ebfa2400b853748da79090c

    • SHA512

      8eab8ea899ebe3edf5b5e2dbaf0924291fac056a5fc71bc79ef829f8a92263aacf174046d9de4371bcb7647c6897f5330bd1769b02dcc3605fb50cd1a47b0e25

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks