General

  • Target

    13ad622d34ea039a978daf635827835df8cce01ab3b6d6982864ee9a0f1b2b78

  • Size

    92KB

  • Sample

    220212-frb34agce5

  • MD5

    eb4750a948dceff0ee03021cb066f202

  • SHA1

    19f48ccbc06a11987f96b0584764cfb8cea37d63

  • SHA256

    13ad622d34ea039a978daf635827835df8cce01ab3b6d6982864ee9a0f1b2b78

  • SHA512

    ede2d1a812700a9def0ab1e5c97ceaa7f3ec1968e0ecb12206baa51c8a5972dbdf68a755dd52715b7db037169aa9ae121a6584f3bcd46e58aef7cf92f1a57f6c

Malware Config

Targets

    • Target

      13ad622d34ea039a978daf635827835df8cce01ab3b6d6982864ee9a0f1b2b78

    • Size

      92KB

    • MD5

      eb4750a948dceff0ee03021cb066f202

    • SHA1

      19f48ccbc06a11987f96b0584764cfb8cea37d63

    • SHA256

      13ad622d34ea039a978daf635827835df8cce01ab3b6d6982864ee9a0f1b2b78

    • SHA512

      ede2d1a812700a9def0ab1e5c97ceaa7f3ec1968e0ecb12206baa51c8a5972dbdf68a755dd52715b7db037169aa9ae121a6584f3bcd46e58aef7cf92f1a57f6c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks