General

  • Target

    13d123316a536f251a04f763ad46461591443e7623e8d5239eeebf185bbaa0ce

  • Size

    79KB

  • Sample

    220212-fn254shham

  • MD5

    aa55db93dfeec66bb93ce2792e87094d

  • SHA1

    0dc03eebf01c61a8e5e1794a50c0eb5f9c60dd38

  • SHA256

    13d123316a536f251a04f763ad46461591443e7623e8d5239eeebf185bbaa0ce

  • SHA512

    eb6b31329f1f3cfefb88308430e64651540ad50a1ff66ed7653cffb63ccd3c34fe4483bb78d37accf9d21b6d28770b0a29bbc3e9ea2821a002cb3a7e883abef1

Malware Config

Targets

    • Target

      13d123316a536f251a04f763ad46461591443e7623e8d5239eeebf185bbaa0ce

    • Size

      79KB

    • MD5

      aa55db93dfeec66bb93ce2792e87094d

    • SHA1

      0dc03eebf01c61a8e5e1794a50c0eb5f9c60dd38

    • SHA256

      13d123316a536f251a04f763ad46461591443e7623e8d5239eeebf185bbaa0ce

    • SHA512

      eb6b31329f1f3cfefb88308430e64651540ad50a1ff66ed7653cffb63ccd3c34fe4483bb78d37accf9d21b6d28770b0a29bbc3e9ea2821a002cb3a7e883abef1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks