General

  • Target

    138ff4ddf94976972a8780fa9110a3f15a06b44e33d058bee49a43a9e9728fa1

  • Size

    58KB

  • Sample

    220212-fsvxlagcg2

  • MD5

    e526b4a5696b880d5c9a5bfd775f67b1

  • SHA1

    ab80e41070cdc08f3f8b99d612ee7d031489c268

  • SHA256

    138ff4ddf94976972a8780fa9110a3f15a06b44e33d058bee49a43a9e9728fa1

  • SHA512

    c6768a64e62dee131eced840cffdfce8902b296c49a7045cef6053f2865ea308579490c11b3ff72ce767001ae2f25b9640c0b855e72502aa20ce386d5919ba40

Malware Config

Targets

    • Target

      138ff4ddf94976972a8780fa9110a3f15a06b44e33d058bee49a43a9e9728fa1

    • Size

      58KB

    • MD5

      e526b4a5696b880d5c9a5bfd775f67b1

    • SHA1

      ab80e41070cdc08f3f8b99d612ee7d031489c268

    • SHA256

      138ff4ddf94976972a8780fa9110a3f15a06b44e33d058bee49a43a9e9728fa1

    • SHA512

      c6768a64e62dee131eced840cffdfce8902b296c49a7045cef6053f2865ea308579490c11b3ff72ce767001ae2f25b9640c0b855e72502aa20ce386d5919ba40

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks