General

  • Target

    136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb

  • Size

    60KB

  • Sample

    220212-fvkveagch3

  • MD5

    a3dca5e8d10e4447b0e247e6dcfea541

  • SHA1

    68eb9a74bb985252559912ff75ab4913833821fa

  • SHA256

    136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb

  • SHA512

    9e2fd841ff6b9f2461d15b18f973cfe8ec357b2f07ca9a2d3b010580aefa41920c586706036655281eb6fc5138161bac523a85434155cd46954613f2f6bbac45

Malware Config

Targets

    • Target

      136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb

    • Size

      60KB

    • MD5

      a3dca5e8d10e4447b0e247e6dcfea541

    • SHA1

      68eb9a74bb985252559912ff75ab4913833821fa

    • SHA256

      136de7eec5b1880c0e78a8ca6a5ff71f8ba92c1bca3c1b146a4e749bfd7e90cb

    • SHA512

      9e2fd841ff6b9f2461d15b18f973cfe8ec357b2f07ca9a2d3b010580aefa41920c586706036655281eb6fc5138161bac523a85434155cd46954613f2f6bbac45

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks