General

  • Target

    12044fabcc285190709e99bcf297c5186ec2c81d4d5cd788acb33dd4fe8a4b95

  • Size

    36KB

  • Sample

    220212-gddkfaabhq

  • MD5

    867bec25af72ca40691b8787b0f23755

  • SHA1

    1fbba14c91fd6168dc14fd7a00f5e39da44b411c

  • SHA256

    12044fabcc285190709e99bcf297c5186ec2c81d4d5cd788acb33dd4fe8a4b95

  • SHA512

    1a0c1d7b570e6adc5580ea0836501365cf173e68ca173a3c9aeed1086c567a433a3f06e9a7dafd4a072e083560828a585aebdfafd697f986d6d90a88b8556882

Malware Config

Targets

    • Target

      12044fabcc285190709e99bcf297c5186ec2c81d4d5cd788acb33dd4fe8a4b95

    • Size

      36KB

    • MD5

      867bec25af72ca40691b8787b0f23755

    • SHA1

      1fbba14c91fd6168dc14fd7a00f5e39da44b411c

    • SHA256

      12044fabcc285190709e99bcf297c5186ec2c81d4d5cd788acb33dd4fe8a4b95

    • SHA512

      1a0c1d7b570e6adc5580ea0836501365cf173e68ca173a3c9aeed1086c567a433a3f06e9a7dafd4a072e083560828a585aebdfafd697f986d6d90a88b8556882

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks