General

  • Target

    13aa08417fa71272055836de19a02d76efe5a409ecc6d25835127102689b22b7

  • Size

    35KB

  • Sample

    220212-frjg6sgce8

  • MD5

    ec5c8eed074f66d69fa4d0d0b5778a97

  • SHA1

    25940467b07f2988a9038bedf1095515e8d003b5

  • SHA256

    13aa08417fa71272055836de19a02d76efe5a409ecc6d25835127102689b22b7

  • SHA512

    f617d658bc17fef17068f375bdfb81355cc1c8b916a02c7502e10e027fc033450b57d6306ad833627d9bcb977563469ae3e1b20cb63362efe77fa8ee9d390d3c

Malware Config

Targets

    • Target

      13aa08417fa71272055836de19a02d76efe5a409ecc6d25835127102689b22b7

    • Size

      35KB

    • MD5

      ec5c8eed074f66d69fa4d0d0b5778a97

    • SHA1

      25940467b07f2988a9038bedf1095515e8d003b5

    • SHA256

      13aa08417fa71272055836de19a02d76efe5a409ecc6d25835127102689b22b7

    • SHA512

      f617d658bc17fef17068f375bdfb81355cc1c8b916a02c7502e10e027fc033450b57d6306ad833627d9bcb977563469ae3e1b20cb63362efe77fa8ee9d390d3c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks