General

  • Target

    1087585481d2b486b866a169f003568a0efc862ae3dd248dd760a25809f3d572

  • Size

    36KB

  • Sample

    220212-gzbmzaghe7

  • MD5

    5ba8b640d31085d6b4f327b6cf01f412

  • SHA1

    f5a515abc4f3e804d8288b88df40a62d0549e9f1

  • SHA256

    1087585481d2b486b866a169f003568a0efc862ae3dd248dd760a25809f3d572

  • SHA512

    ae12cb2eecf540ce40f839ec7fed1ee9bbb29ba232fe4900762fa8fb83ed6cc89306fe28a29074a028a8ddcc708a56b5bf188d4ca18ab4b21677da76303fb88b

Malware Config

Targets

    • Target

      1087585481d2b486b866a169f003568a0efc862ae3dd248dd760a25809f3d572

    • Size

      36KB

    • MD5

      5ba8b640d31085d6b4f327b6cf01f412

    • SHA1

      f5a515abc4f3e804d8288b88df40a62d0549e9f1

    • SHA256

      1087585481d2b486b866a169f003568a0efc862ae3dd248dd760a25809f3d572

    • SHA512

      ae12cb2eecf540ce40f839ec7fed1ee9bbb29ba232fe4900762fa8fb83ed6cc89306fe28a29074a028a8ddcc708a56b5bf188d4ca18ab4b21677da76303fb88b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks