General

  • Target

    10bade12532ad66ea2d15c5e49f66c9d141b9782ac7b00d149a72d06326d1063

  • Size

    60KB

  • Sample

    220212-gwcqvsadgr

  • MD5

    a1e207fdd8a8948c472a37a99338f983

  • SHA1

    03410067c92e995c61b502bb2ab6e5785e361f96

  • SHA256

    10bade12532ad66ea2d15c5e49f66c9d141b9782ac7b00d149a72d06326d1063

  • SHA512

    dc10a7888abfb25e25972f57dd2089eb816f73d25f99276543cc30aee17e92ad67d4a35bc9398026a2053d82484262023280d113b10f46be9b59645d250231bb

Malware Config

Targets

    • Target

      10bade12532ad66ea2d15c5e49f66c9d141b9782ac7b00d149a72d06326d1063

    • Size

      60KB

    • MD5

      a1e207fdd8a8948c472a37a99338f983

    • SHA1

      03410067c92e995c61b502bb2ab6e5785e361f96

    • SHA256

      10bade12532ad66ea2d15c5e49f66c9d141b9782ac7b00d149a72d06326d1063

    • SHA512

      dc10a7888abfb25e25972f57dd2089eb816f73d25f99276543cc30aee17e92ad67d4a35bc9398026a2053d82484262023280d113b10f46be9b59645d250231bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks