General

  • Target

    11ae4eb76a3eba4e08dfc99f6e2b136cbed61425e079236e8f4c0a82c0ee642d

  • Size

    80KB

  • Sample

    220212-gg4k2aacdm

  • MD5

    50103ae6c1b1f0e06a40eb4ee3d96526

  • SHA1

    b1944b695062408e03b661d42f6554606e88daa1

  • SHA256

    11ae4eb76a3eba4e08dfc99f6e2b136cbed61425e079236e8f4c0a82c0ee642d

  • SHA512

    f13ed7562e04f0b3e493f697fa2c39362ba5aacf7c2aaff630e313ac9e42f4caaeaf351a5c418f6607f060f392c07cba48d467a5abd87885051ec78d7fb8735b

Malware Config

Targets

    • Target

      11ae4eb76a3eba4e08dfc99f6e2b136cbed61425e079236e8f4c0a82c0ee642d

    • Size

      80KB

    • MD5

      50103ae6c1b1f0e06a40eb4ee3d96526

    • SHA1

      b1944b695062408e03b661d42f6554606e88daa1

    • SHA256

      11ae4eb76a3eba4e08dfc99f6e2b136cbed61425e079236e8f4c0a82c0ee642d

    • SHA512

      f13ed7562e04f0b3e493f697fa2c39362ba5aacf7c2aaff630e313ac9e42f4caaeaf351a5c418f6607f060f392c07cba48d467a5abd87885051ec78d7fb8735b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks