General

  • Target

    1169f0f1e10a93932ebfae8836fc3d90a1564d311514da9b13e0455c452ebea1

  • Size

    60KB

  • Sample

    220212-glcm4sgfh5

  • MD5

    48bdde548fe3d7d477fee63026ca0161

  • SHA1

    fe87f4ced4900da624072ace659b37ba465a2ccd

  • SHA256

    1169f0f1e10a93932ebfae8836fc3d90a1564d311514da9b13e0455c452ebea1

  • SHA512

    8ba183c20543a2dc5da6478defb922f963c14c1726b3ac5894d1c582301e2fa37c1353f12528173f576eaaf98dccd195714aec2230f9b631dfe00173eb952f2c

Malware Config

Targets

    • Target

      1169f0f1e10a93932ebfae8836fc3d90a1564d311514da9b13e0455c452ebea1

    • Size

      60KB

    • MD5

      48bdde548fe3d7d477fee63026ca0161

    • SHA1

      fe87f4ced4900da624072ace659b37ba465a2ccd

    • SHA256

      1169f0f1e10a93932ebfae8836fc3d90a1564d311514da9b13e0455c452ebea1

    • SHA512

      8ba183c20543a2dc5da6478defb922f963c14c1726b3ac5894d1c582301e2fa37c1353f12528173f576eaaf98dccd195714aec2230f9b631dfe00173eb952f2c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks