General

  • Target

    1058050289d02e8cfc203b5505bd50e7caf7943ff64f315b49da07ccb8539edd

  • Size

    60KB

  • Sample

    220212-g2v5dsaeek

  • MD5

    d3d80e0ba192a4e9c4f3499653ee2caf

  • SHA1

    d2d2bc433ea938fbc278e3bc0d3c73b97e471c2b

  • SHA256

    1058050289d02e8cfc203b5505bd50e7caf7943ff64f315b49da07ccb8539edd

  • SHA512

    4ed887beb7e07b9c5c1a7918f80ab90c5cdb266e599c49f145cda6d1701bd7d3c7df7e4cf477a56bbf7357f584b2ad29446d146968a97fc56c5bf11d1f9a0b14

Malware Config

Targets

    • Target

      1058050289d02e8cfc203b5505bd50e7caf7943ff64f315b49da07ccb8539edd

    • Size

      60KB

    • MD5

      d3d80e0ba192a4e9c4f3499653ee2caf

    • SHA1

      d2d2bc433ea938fbc278e3bc0d3c73b97e471c2b

    • SHA256

      1058050289d02e8cfc203b5505bd50e7caf7943ff64f315b49da07ccb8539edd

    • SHA512

      4ed887beb7e07b9c5c1a7918f80ab90c5cdb266e599c49f145cda6d1701bd7d3c7df7e4cf477a56bbf7357f584b2ad29446d146968a97fc56c5bf11d1f9a0b14

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks