General

  • Target

    10e56d536b1046cb55156c1dadf658ebd5e19ff603b020d2a10d70228dc56301

  • Size

    60KB

  • Sample

    220212-gtqjyaggh7

  • MD5

    f0b91a0f5ee09eeab11f122cc300915d

  • SHA1

    413e4d42eff84b5cfb90bb7cfc250123a75c4f63

  • SHA256

    10e56d536b1046cb55156c1dadf658ebd5e19ff603b020d2a10d70228dc56301

  • SHA512

    f88ac38b53c5064c34fc6cb87f54c64f57e7721e0a0e4a1082f87ca6770642f0473cd045e256d2e55c14524047f3be0a234afaf002242396d45c8a5dd9e7766d

Malware Config

Targets

    • Target

      10e56d536b1046cb55156c1dadf658ebd5e19ff603b020d2a10d70228dc56301

    • Size

      60KB

    • MD5

      f0b91a0f5ee09eeab11f122cc300915d

    • SHA1

      413e4d42eff84b5cfb90bb7cfc250123a75c4f63

    • SHA256

      10e56d536b1046cb55156c1dadf658ebd5e19ff603b020d2a10d70228dc56301

    • SHA512

      f88ac38b53c5064c34fc6cb87f54c64f57e7721e0a0e4a1082f87ca6770642f0473cd045e256d2e55c14524047f3be0a234afaf002242396d45c8a5dd9e7766d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks