General

  • Target

    1337a3440d58864e163d8c60695a6a6a663a24604896178ea9be4a571b0b3ea4

  • Size

    58KB

  • Sample

    220212-fyfd4aaabj

  • MD5

    9726b1c8cedb30c33c6d23e67219d8dc

  • SHA1

    dda7ca87aadb40814f6067c35bfab47fcb27f61e

  • SHA256

    1337a3440d58864e163d8c60695a6a6a663a24604896178ea9be4a571b0b3ea4

  • SHA512

    d816706c3e7159efe2110d0ccfb2a25d3cdb70b1566a0d6c484f51dbac0da51bde419353642be6e522aedcaa7f566ceb10e6e68a0baafc1c456609ab9782bb27

Malware Config

Targets

    • Target

      1337a3440d58864e163d8c60695a6a6a663a24604896178ea9be4a571b0b3ea4

    • Size

      58KB

    • MD5

      9726b1c8cedb30c33c6d23e67219d8dc

    • SHA1

      dda7ca87aadb40814f6067c35bfab47fcb27f61e

    • SHA256

      1337a3440d58864e163d8c60695a6a6a663a24604896178ea9be4a571b0b3ea4

    • SHA512

      d816706c3e7159efe2110d0ccfb2a25d3cdb70b1566a0d6c484f51dbac0da51bde419353642be6e522aedcaa7f566ceb10e6e68a0baafc1c456609ab9782bb27

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks