General

  • Target

    13ea2810c98e659df9171a0def702a526142a52fa56978b51302465058ba35dc

  • Size

    80KB

  • Sample

    220212-fmnw4ahggq

  • MD5

    37008d031819c2e26d3b180fe8bf7796

  • SHA1

    5d3036e42ae8a29efd99730ccacfe2c8ab848af2

  • SHA256

    13ea2810c98e659df9171a0def702a526142a52fa56978b51302465058ba35dc

  • SHA512

    990330972a1b225d80294feebb1a526a7382c4bbe27075c824756b9d365a1d74d27d1d7a28f73809dba24a7d39923c639dc42828dbf78a44e092daa740037443

Malware Config

Targets

    • Target

      13ea2810c98e659df9171a0def702a526142a52fa56978b51302465058ba35dc

    • Size

      80KB

    • MD5

      37008d031819c2e26d3b180fe8bf7796

    • SHA1

      5d3036e42ae8a29efd99730ccacfe2c8ab848af2

    • SHA256

      13ea2810c98e659df9171a0def702a526142a52fa56978b51302465058ba35dc

    • SHA512

      990330972a1b225d80294feebb1a526a7382c4bbe27075c824756b9d365a1d74d27d1d7a28f73809dba24a7d39923c639dc42828dbf78a44e092daa740037443

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks