General

  • Target

    0f28905bfbfc4dad9cb1e9e25ab74a94145e88b270457849ce721138067b4f40

  • Size

    58KB

  • Sample

    220212-hgzgraagdj

  • MD5

    86d9435d500e807e2d31cbb367e67a0c

  • SHA1

    caaba8f5064feb38f29bb324a4266574104c5c7b

  • SHA256

    0f28905bfbfc4dad9cb1e9e25ab74a94145e88b270457849ce721138067b4f40

  • SHA512

    e492e2ece1dc1b21647741008dc59df31829561c8327ef5405918b20e38b21d55421e59c1eaacf7178634a1d0027f26e05c40d9bb0451c718934a944b23cf38a

Malware Config

Targets

    • Target

      0f28905bfbfc4dad9cb1e9e25ab74a94145e88b270457849ce721138067b4f40

    • Size

      58KB

    • MD5

      86d9435d500e807e2d31cbb367e67a0c

    • SHA1

      caaba8f5064feb38f29bb324a4266574104c5c7b

    • SHA256

      0f28905bfbfc4dad9cb1e9e25ab74a94145e88b270457849ce721138067b4f40

    • SHA512

      e492e2ece1dc1b21647741008dc59df31829561c8327ef5405918b20e38b21d55421e59c1eaacf7178634a1d0027f26e05c40d9bb0451c718934a944b23cf38a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks