General

  • Target

    11c258a0c4f6d61f19fc0f6c87a980d65bfe3ee994057066b93430669f074dd5

  • Size

    121KB

  • Sample

    220212-gf53gagfc4

  • MD5

    e89813cfd2650181711293d6afa1315e

  • SHA1

    ae94178ee961bce32e042cf6d33957d3274f4c43

  • SHA256

    11c258a0c4f6d61f19fc0f6c87a980d65bfe3ee994057066b93430669f074dd5

  • SHA512

    c03a49417d5058a11d96440d082f94787d86cbea14c5e868d379a5a92b2a19a3f15db62b14ae18570577946b51c28b8e0f63fa50fe4cc14f464c86064369d313

Malware Config

Targets

    • Target

      11c258a0c4f6d61f19fc0f6c87a980d65bfe3ee994057066b93430669f074dd5

    • Size

      121KB

    • MD5

      e89813cfd2650181711293d6afa1315e

    • SHA1

      ae94178ee961bce32e042cf6d33957d3274f4c43

    • SHA256

      11c258a0c4f6d61f19fc0f6c87a980d65bfe3ee994057066b93430669f074dd5

    • SHA512

      c03a49417d5058a11d96440d082f94787d86cbea14c5e868d379a5a92b2a19a3f15db62b14ae18570577946b51c28b8e0f63fa50fe4cc14f464c86064369d313

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks