General

  • Target

    1449931fbbf278ed69058c671f143d543a2cfb864b85f6fd075e8c0ce23a2314

  • Size

    60KB

  • Sample

    220212-fgb1cagbe9

  • MD5

    71d112273caacc8783107d92c657d2e6

  • SHA1

    892c8049213d0dae947175cad234713be8e37e73

  • SHA256

    1449931fbbf278ed69058c671f143d543a2cfb864b85f6fd075e8c0ce23a2314

  • SHA512

    1dd5f2bdd703a7639d71f3f51045172af8fb8d0e65eea24d70ba651cce0d82532f16a8be352611f6867768066e41c572f6ceea13f0f43568be69f6322345d905

Malware Config

Targets

    • Target

      1449931fbbf278ed69058c671f143d543a2cfb864b85f6fd075e8c0ce23a2314

    • Size

      60KB

    • MD5

      71d112273caacc8783107d92c657d2e6

    • SHA1

      892c8049213d0dae947175cad234713be8e37e73

    • SHA256

      1449931fbbf278ed69058c671f143d543a2cfb864b85f6fd075e8c0ce23a2314

    • SHA512

      1dd5f2bdd703a7639d71f3f51045172af8fb8d0e65eea24d70ba651cce0d82532f16a8be352611f6867768066e41c572f6ceea13f0f43568be69f6322345d905

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks