General

  • Target

    13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd

  • Size

    60KB

  • Sample

    220212-fkrj7shgen

  • MD5

    b0fc0d8258025c8138b7c0f780383c3d

  • SHA1

    335724c68aeaebc6b8155cb472979f6998df6e2f

  • SHA256

    13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd

  • SHA512

    4947bca4b299a5ec2278643f67a74e70c51fd035da1f6b1c95b7db33ea6fd843cf369c9d1676da8aa044e66d4ee57ffbf423b5db4ddd5c5af360786e0a4eaee8

Malware Config

Targets

    • Target

      13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd

    • Size

      60KB

    • MD5

      b0fc0d8258025c8138b7c0f780383c3d

    • SHA1

      335724c68aeaebc6b8155cb472979f6998df6e2f

    • SHA256

      13ffc08eaadcd0cd657f4a970e44c7266bd9cec16755595985ad218f5be124dd

    • SHA512

      4947bca4b299a5ec2278643f67a74e70c51fd035da1f6b1c95b7db33ea6fd843cf369c9d1676da8aa044e66d4ee57ffbf423b5db4ddd5c5af360786e0a4eaee8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks