General

  • Target

    10d15f3cdcc378493ee1fa1721186344edd1515ed9d96870364dfaac165db30c

  • Size

    60KB

  • Sample

    220212-gvmjnsgha7

  • MD5

    539e2c76ce632ef959e17b4c6e52ac72

  • SHA1

    b4e8844de8208c1f9b18c03f0c9fe9f93c5abce6

  • SHA256

    10d15f3cdcc378493ee1fa1721186344edd1515ed9d96870364dfaac165db30c

  • SHA512

    c4c8e09e6dc1da1db22c1b23f2281e037ebe09004d2be5b83d2362d2a8e2303c76c8f59c0e74ec03add00b6261af646c61145d8a575e79c0a9b9478fe60c40fb

Malware Config

Targets

    • Target

      10d15f3cdcc378493ee1fa1721186344edd1515ed9d96870364dfaac165db30c

    • Size

      60KB

    • MD5

      539e2c76ce632ef959e17b4c6e52ac72

    • SHA1

      b4e8844de8208c1f9b18c03f0c9fe9f93c5abce6

    • SHA256

      10d15f3cdcc378493ee1fa1721186344edd1515ed9d96870364dfaac165db30c

    • SHA512

      c4c8e09e6dc1da1db22c1b23f2281e037ebe09004d2be5b83d2362d2a8e2303c76c8f59c0e74ec03add00b6261af646c61145d8a575e79c0a9b9478fe60c40fb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks