General

  • Target

    13e9ab0d9afb78256fcb3507b369a91db3adab00d35a1c6ce1ea13bfd0bb20ce

  • Size

    79KB

  • Sample

    220212-fmsv2shghj

  • MD5

    14628935ff245209e97ca97bc77dbe2c

  • SHA1

    190d46c11b3c719242389c38b8e6470bf7afb060

  • SHA256

    13e9ab0d9afb78256fcb3507b369a91db3adab00d35a1c6ce1ea13bfd0bb20ce

  • SHA512

    179a0202471d6edac02d7aa57e2357cfd212677713595efdb2273b127ca9558ae5270d26afc4bd98a628079e015b59e349f2befb468265dec0f37a7614caa341

Malware Config

Targets

    • Target

      13e9ab0d9afb78256fcb3507b369a91db3adab00d35a1c6ce1ea13bfd0bb20ce

    • Size

      79KB

    • MD5

      14628935ff245209e97ca97bc77dbe2c

    • SHA1

      190d46c11b3c719242389c38b8e6470bf7afb060

    • SHA256

      13e9ab0d9afb78256fcb3507b369a91db3adab00d35a1c6ce1ea13bfd0bb20ce

    • SHA512

      179a0202471d6edac02d7aa57e2357cfd212677713595efdb2273b127ca9558ae5270d26afc4bd98a628079e015b59e349f2befb468265dec0f37a7614caa341

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks