General

  • Target

    13eb00572d8294309f279a4c1a373452bd5248d21dfd54dc8666916d7e29221b

  • Size

    150KB

  • Sample

    220212-fmgssagcb3

  • MD5

    fd4bb078957db97443cb8382b5a97f86

  • SHA1

    84de05b403ef855d1d7c177fb5e002001d400250

  • SHA256

    13eb00572d8294309f279a4c1a373452bd5248d21dfd54dc8666916d7e29221b

  • SHA512

    6f301c800cd7fe10f1159b521de5e4be9af0f1eda037e399b7037acd0cfa95ba0818bffc8ac805550a4e0bfb9580ee217cda4c75beea024b6646a8686f291cae

Malware Config

Targets

    • Target

      13eb00572d8294309f279a4c1a373452bd5248d21dfd54dc8666916d7e29221b

    • Size

      150KB

    • MD5

      fd4bb078957db97443cb8382b5a97f86

    • SHA1

      84de05b403ef855d1d7c177fb5e002001d400250

    • SHA256

      13eb00572d8294309f279a4c1a373452bd5248d21dfd54dc8666916d7e29221b

    • SHA512

      6f301c800cd7fe10f1159b521de5e4be9af0f1eda037e399b7037acd0cfa95ba0818bffc8ac805550a4e0bfb9580ee217cda4c75beea024b6646a8686f291cae

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks