General

  • Target

    1216df57001344182ae91b58128fcf60bcf8978db02e2af0fb93855fc7377645

  • Size

    58KB

  • Sample

    220212-gcx8fsgeg9

  • MD5

    f106ebec6104a4d82302420ebf926dc0

  • SHA1

    0813a0577ebbaaed2b09579baa24bcd335b2692e

  • SHA256

    1216df57001344182ae91b58128fcf60bcf8978db02e2af0fb93855fc7377645

  • SHA512

    417c9aff2f4f685a4e939062bb0ef0405dd6b1dcc9e250ceebfa6336b857ed94f58d7dbc5c6dd4c5ebbf5da56f02173617bf71b1edd4f8b74b0d2d1dfc2a4472

Malware Config

Targets

    • Target

      1216df57001344182ae91b58128fcf60bcf8978db02e2af0fb93855fc7377645

    • Size

      58KB

    • MD5

      f106ebec6104a4d82302420ebf926dc0

    • SHA1

      0813a0577ebbaaed2b09579baa24bcd335b2692e

    • SHA256

      1216df57001344182ae91b58128fcf60bcf8978db02e2af0fb93855fc7377645

    • SHA512

      417c9aff2f4f685a4e939062bb0ef0405dd6b1dcc9e250ceebfa6336b857ed94f58d7dbc5c6dd4c5ebbf5da56f02173617bf71b1edd4f8b74b0d2d1dfc2a4472

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks