General

  • Target

    143c2210e6fc58ce545ad1523a1da1672a14f5556e3e857b6643b07d17749191

  • Size

    60KB

  • Sample

    220212-fgzreagbf6

  • MD5

    e3314d4dd66362255d1703840cfbe109

  • SHA1

    fdbbbc51c7a7ec686842604b4284ff58d49af97a

  • SHA256

    143c2210e6fc58ce545ad1523a1da1672a14f5556e3e857b6643b07d17749191

  • SHA512

    b8ec4cd7e5efcfaa948abfe69cc0b7a38c186e766487a7c94d62d9442ce0542f83beac0591e624f8cbf063eb5cd296aee9ce76b46f9ccf2a2b0f4fe8b42b148e

Malware Config

Targets

    • Target

      143c2210e6fc58ce545ad1523a1da1672a14f5556e3e857b6643b07d17749191

    • Size

      60KB

    • MD5

      e3314d4dd66362255d1703840cfbe109

    • SHA1

      fdbbbc51c7a7ec686842604b4284ff58d49af97a

    • SHA256

      143c2210e6fc58ce545ad1523a1da1672a14f5556e3e857b6643b07d17749191

    • SHA512

      b8ec4cd7e5efcfaa948abfe69cc0b7a38c186e766487a7c94d62d9442ce0542f83beac0591e624f8cbf063eb5cd296aee9ce76b46f9ccf2a2b0f4fe8b42b148e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks