General

  • Target

    119f644c0a154adc5ef5e872f7c76d7900a706976944738f2b90d0e63a0bc815

  • Size

    60KB

  • Sample

    220212-gh5vgsacej

  • MD5

    e9fe2917ed41d46388fa1bf7490c44b0

  • SHA1

    bf300626fd32c0cab1e547063236cab5507be968

  • SHA256

    119f644c0a154adc5ef5e872f7c76d7900a706976944738f2b90d0e63a0bc815

  • SHA512

    286387474e0e781e8b789c61c5f047639ec018baad834f14b156c5bdd3caa0487e536f065313e71f7dbc2a057165d66ab47444f524aa3d6d140262d295770307

Malware Config

Targets

    • Target

      119f644c0a154adc5ef5e872f7c76d7900a706976944738f2b90d0e63a0bc815

    • Size

      60KB

    • MD5

      e9fe2917ed41d46388fa1bf7490c44b0

    • SHA1

      bf300626fd32c0cab1e547063236cab5507be968

    • SHA256

      119f644c0a154adc5ef5e872f7c76d7900a706976944738f2b90d0e63a0bc815

    • SHA512

      286387474e0e781e8b789c61c5f047639ec018baad834f14b156c5bdd3caa0487e536f065313e71f7dbc2a057165d66ab47444f524aa3d6d140262d295770307

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks