General

  • Target

    13d08c04219732696ad63ccf5eaa891eb64c419fea4099d12db9ae7ae9386785

  • Size

    35KB

  • Sample

    220212-fpd5nshhar

  • MD5

    46207d2348763610e7df13d763d6a28f

  • SHA1

    7a0f2bd5ca2f5da71d65e957fdf0772f07b63b86

  • SHA256

    13d08c04219732696ad63ccf5eaa891eb64c419fea4099d12db9ae7ae9386785

  • SHA512

    be6560542db4b7853a7d02ba0cbbd2297d17f3d2f2b446e5607123eeba4c101e869570a120c8d88d246121d3120c8293dde54ac16e9ed41e6c808eb13d8d9d31

Malware Config

Targets

    • Target

      13d08c04219732696ad63ccf5eaa891eb64c419fea4099d12db9ae7ae9386785

    • Size

      35KB

    • MD5

      46207d2348763610e7df13d763d6a28f

    • SHA1

      7a0f2bd5ca2f5da71d65e957fdf0772f07b63b86

    • SHA256

      13d08c04219732696ad63ccf5eaa891eb64c419fea4099d12db9ae7ae9386785

    • SHA512

      be6560542db4b7853a7d02ba0cbbd2297d17f3d2f2b446e5607123eeba4c101e869570a120c8d88d246121d3120c8293dde54ac16e9ed41e6c808eb13d8d9d31

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks