General

  • Target

    13f665ef9f9c289b727b154c874176d6afaa24aeac4bf7758e2ace3f7122be00

  • Size

    35KB

  • Sample

    220212-fltqysgca7

  • MD5

    cca9695a085b7e92394a1cee8a6f4ad7

  • SHA1

    2cac60737db14e86caa79a21c1f31d146b457f13

  • SHA256

    13f665ef9f9c289b727b154c874176d6afaa24aeac4bf7758e2ace3f7122be00

  • SHA512

    38041d3697580b74ea30971acc774a1f7bc387b140eb8206c4bc170b6316d9fc048365be8bf4e706763528fa97ddb91683056a6b426d9bb065edcb0e25186b13

Malware Config

Targets

    • Target

      13f665ef9f9c289b727b154c874176d6afaa24aeac4bf7758e2ace3f7122be00

    • Size

      35KB

    • MD5

      cca9695a085b7e92394a1cee8a6f4ad7

    • SHA1

      2cac60737db14e86caa79a21c1f31d146b457f13

    • SHA256

      13f665ef9f9c289b727b154c874176d6afaa24aeac4bf7758e2ace3f7122be00

    • SHA512

      38041d3697580b74ea30971acc774a1f7bc387b140eb8206c4bc170b6316d9fc048365be8bf4e706763528fa97ddb91683056a6b426d9bb065edcb0e25186b13

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks