General

  • Target

    1324c60eb28e138c417cfb204d994257d4b9969d3adabd947e577b43ccd34e34

  • Size

    58KB

  • Sample

    220212-fzbgjagdd4

  • MD5

    910696bbc69fc89cbd6d5dcdb5533d30

  • SHA1

    2ea2e464b34ba93004826f5a9ba79d4ff6d8326d

  • SHA256

    1324c60eb28e138c417cfb204d994257d4b9969d3adabd947e577b43ccd34e34

  • SHA512

    0e6373d1a0adf339295381a0b7b72f6a40cfb229dc25d41f99a076e98c176b2adf7741d27678eaad21aee65814883b9d9b2d127b8ba86cc97be3982fede32e96

Malware Config

Targets

    • Target

      1324c60eb28e138c417cfb204d994257d4b9969d3adabd947e577b43ccd34e34

    • Size

      58KB

    • MD5

      910696bbc69fc89cbd6d5dcdb5533d30

    • SHA1

      2ea2e464b34ba93004826f5a9ba79d4ff6d8326d

    • SHA256

      1324c60eb28e138c417cfb204d994257d4b9969d3adabd947e577b43ccd34e34

    • SHA512

      0e6373d1a0adf339295381a0b7b72f6a40cfb229dc25d41f99a076e98c176b2adf7741d27678eaad21aee65814883b9d9b2d127b8ba86cc97be3982fede32e96

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks