General

  • Target

    13fa710c8926a6fdbb5cef19372bebe3188b082655b1ccc7c233fc6072794826

  • Size

    60KB

  • Sample

    220212-flayvagca4

  • MD5

    284cacf8d6865126521fd32ecea4a7ea

  • SHA1

    8448f783fd8580331defc71e16af5d3191dd9ade

  • SHA256

    13fa710c8926a6fdbb5cef19372bebe3188b082655b1ccc7c233fc6072794826

  • SHA512

    c9ef39a9661cb49ca1e141abf32905d8c4e4ed1d1540169dd78974455c303300d5f35cf1a9ded1010a3e4030897d3e71ff07e058bea90df130c388bc0b95c16d

Malware Config

Targets

    • Target

      13fa710c8926a6fdbb5cef19372bebe3188b082655b1ccc7c233fc6072794826

    • Size

      60KB

    • MD5

      284cacf8d6865126521fd32ecea4a7ea

    • SHA1

      8448f783fd8580331defc71e16af5d3191dd9ade

    • SHA256

      13fa710c8926a6fdbb5cef19372bebe3188b082655b1ccc7c233fc6072794826

    • SHA512

      c9ef39a9661cb49ca1e141abf32905d8c4e4ed1d1540169dd78974455c303300d5f35cf1a9ded1010a3e4030897d3e71ff07e058bea90df130c388bc0b95c16d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks