General

  • Target

    10c3d75aa77dc9ac8e76c538fa7d70c1163fe3cb10db9d79d7388fd2826349a7

  • Size

    35KB

  • Sample

    220212-gvylyaghb2

  • MD5

    0dd0fd8b95d812d45e2658412ddeb3e0

  • SHA1

    f5a37ae24a153b275927d661db12a2e9c1dc934a

  • SHA256

    10c3d75aa77dc9ac8e76c538fa7d70c1163fe3cb10db9d79d7388fd2826349a7

  • SHA512

    633e38ce0639ab3d7340d3b143a45e8121617737742cecc0e64ff411fce35fb7bce813899129306f61348d9554268eb82d04717c232501a48104f01d7d4a9143

Malware Config

Targets

    • Target

      10c3d75aa77dc9ac8e76c538fa7d70c1163fe3cb10db9d79d7388fd2826349a7

    • Size

      35KB

    • MD5

      0dd0fd8b95d812d45e2658412ddeb3e0

    • SHA1

      f5a37ae24a153b275927d661db12a2e9c1dc934a

    • SHA256

      10c3d75aa77dc9ac8e76c538fa7d70c1163fe3cb10db9d79d7388fd2826349a7

    • SHA512

      633e38ce0639ab3d7340d3b143a45e8121617737742cecc0e64ff411fce35fb7bce813899129306f61348d9554268eb82d04717c232501a48104f01d7d4a9143

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks