General

  • Target

    14381d0f0947debf6c0cf0408f7bb4e03a587279b23f189e930fc192ba5f7d0f

  • Size

    100KB

  • Sample

    220212-fg6vqahgbl

  • MD5

    046131040d496d26ca236437f7f2a6b3

  • SHA1

    0a25e7042fa3ba86511020a247b6e13cab516833

  • SHA256

    14381d0f0947debf6c0cf0408f7bb4e03a587279b23f189e930fc192ba5f7d0f

  • SHA512

    0098501dc859a9c06402fb71034bd00a4f89e0f12b632acf5847f50f81978b6f51683ce3ea69531f1d84c7a828c94fb2a258c582d758a25484fb5cfaede754ba

Malware Config

Targets

    • Target

      14381d0f0947debf6c0cf0408f7bb4e03a587279b23f189e930fc192ba5f7d0f

    • Size

      100KB

    • MD5

      046131040d496d26ca236437f7f2a6b3

    • SHA1

      0a25e7042fa3ba86511020a247b6e13cab516833

    • SHA256

      14381d0f0947debf6c0cf0408f7bb4e03a587279b23f189e930fc192ba5f7d0f

    • SHA512

      0098501dc859a9c06402fb71034bd00a4f89e0f12b632acf5847f50f81978b6f51683ce3ea69531f1d84c7a828c94fb2a258c582d758a25484fb5cfaede754ba

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks