General

  • Target

    13cb030c5c319c5e2ce8c23ddf22e8466c640e09ffc1cf8a074be17a5b756549

  • Size

    36KB

  • Sample

    220212-fpq48sgcc9

  • MD5

    322f23307d8592fa8d93886ad1191f56

  • SHA1

    c456cdee32c0637c9b2155b5a034d61f4dcd6f17

  • SHA256

    13cb030c5c319c5e2ce8c23ddf22e8466c640e09ffc1cf8a074be17a5b756549

  • SHA512

    fbce101fb88f6305b1932131d1a4c1d9186a42086108b2e6b564457fce8dfd74a061a8fd5f1f42c08af954e33bf99700c13812eec6f73ec54441c2434a9748d8

Malware Config

Targets

    • Target

      13cb030c5c319c5e2ce8c23ddf22e8466c640e09ffc1cf8a074be17a5b756549

    • Size

      36KB

    • MD5

      322f23307d8592fa8d93886ad1191f56

    • SHA1

      c456cdee32c0637c9b2155b5a034d61f4dcd6f17

    • SHA256

      13cb030c5c319c5e2ce8c23ddf22e8466c640e09ffc1cf8a074be17a5b756549

    • SHA512

      fbce101fb88f6305b1932131d1a4c1d9186a42086108b2e6b564457fce8dfd74a061a8fd5f1f42c08af954e33bf99700c13812eec6f73ec54441c2434a9748d8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks