General

  • Target

    13fcab71b74a3e9c95af1f2954419c6bf5f13e50e1644dd30f7ceeee2b48d9a4

  • Size

    58KB

  • Sample

    220212-fk2eeahger

  • MD5

    aed18bbe96123954a09c8eaf8780a369

  • SHA1

    b5ff3c9689d1f2c01bfe798e95ecc1fb819c05e1

  • SHA256

    13fcab71b74a3e9c95af1f2954419c6bf5f13e50e1644dd30f7ceeee2b48d9a4

  • SHA512

    d78870a1d2a6b17f3c804805c331932d315c22d373bb0dcb8181ec42042ba53a9998729b76b3dcf7117897b5865602004723526eaff9eaad90732b155d0f6a33

Malware Config

Targets

    • Target

      13fcab71b74a3e9c95af1f2954419c6bf5f13e50e1644dd30f7ceeee2b48d9a4

    • Size

      58KB

    • MD5

      aed18bbe96123954a09c8eaf8780a369

    • SHA1

      b5ff3c9689d1f2c01bfe798e95ecc1fb819c05e1

    • SHA256

      13fcab71b74a3e9c95af1f2954419c6bf5f13e50e1644dd30f7ceeee2b48d9a4

    • SHA512

      d78870a1d2a6b17f3c804805c331932d315c22d373bb0dcb8181ec42042ba53a9998729b76b3dcf7117897b5865602004723526eaff9eaad90732b155d0f6a33

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks