General

  • Target

    103669852071c157f5d4bac841cf13b3e7436124da68320cfbc05d4b98fba202

  • Size

    60KB

  • Sample

    220212-g4r6hsaefr

  • MD5

    739fb34b4198aecdeeb8e2fe08c5bd02

  • SHA1

    a9a83c219366c14ac229c5ada7c01c3979887612

  • SHA256

    103669852071c157f5d4bac841cf13b3e7436124da68320cfbc05d4b98fba202

  • SHA512

    1b8db8180de6eda182938f242b4ddc087be89d64a5c8a6c405e054b02aa89b18ef6d35c26d8b21489927cb60e3d43395e196a35451536d57a7c99e7965c0897d

Malware Config

Targets

    • Target

      103669852071c157f5d4bac841cf13b3e7436124da68320cfbc05d4b98fba202

    • Size

      60KB

    • MD5

      739fb34b4198aecdeeb8e2fe08c5bd02

    • SHA1

      a9a83c219366c14ac229c5ada7c01c3979887612

    • SHA256

      103669852071c157f5d4bac841cf13b3e7436124da68320cfbc05d4b98fba202

    • SHA512

      1b8db8180de6eda182938f242b4ddc087be89d64a5c8a6c405e054b02aa89b18ef6d35c26d8b21489927cb60e3d43395e196a35451536d57a7c99e7965c0897d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks