General

  • Target

    11813e32bd55267ddd0c1aaffbfd2b01e9824d18d711fdad4947aa123bb21e08

  • Size

    60KB

  • Sample

    220212-gj9vtsacfj

  • MD5

    ae01b470851756cb51251f41924324ef

  • SHA1

    e0a4cd8523669e2678a877efe3dd380178aed71f

  • SHA256

    11813e32bd55267ddd0c1aaffbfd2b01e9824d18d711fdad4947aa123bb21e08

  • SHA512

    6a322653f9a75ac575a0ae61f15fe8cab4c45b238f9b7ef8a798f33bede8407f872a3bd2ee292e6caf4d9cba759428baa2d60b103fcd70df47f8014b3599c0b6

Malware Config

Targets

    • Target

      11813e32bd55267ddd0c1aaffbfd2b01e9824d18d711fdad4947aa123bb21e08

    • Size

      60KB

    • MD5

      ae01b470851756cb51251f41924324ef

    • SHA1

      e0a4cd8523669e2678a877efe3dd380178aed71f

    • SHA256

      11813e32bd55267ddd0c1aaffbfd2b01e9824d18d711fdad4947aa123bb21e08

    • SHA512

      6a322653f9a75ac575a0ae61f15fe8cab4c45b238f9b7ef8a798f33bede8407f872a3bd2ee292e6caf4d9cba759428baa2d60b103fcd70df47f8014b3599c0b6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks