General

  • Target

    075a5c448648f728cb240f337e412ffff4edd369889c37829da08fe42b55d139

  • Size

    58KB

  • Sample

    220212-mfbrhscgel

  • MD5

    f3c859f944657978b196d73f3bf56483

  • SHA1

    23e4ae27a3f1b81600e226ccad7333c28cedcf92

  • SHA256

    075a5c448648f728cb240f337e412ffff4edd369889c37829da08fe42b55d139

  • SHA512

    87405d4f2ae9693052ff2a914bbc3e79f1ee9c2cf92e92d8677b916b396ea77a89a789f36fa00d54bcbc60fd902347a35b041d67dce09808bfaf580b3387c0b8

Malware Config

Targets

    • Target

      075a5c448648f728cb240f337e412ffff4edd369889c37829da08fe42b55d139

    • Size

      58KB

    • MD5

      f3c859f944657978b196d73f3bf56483

    • SHA1

      23e4ae27a3f1b81600e226ccad7333c28cedcf92

    • SHA256

      075a5c448648f728cb240f337e412ffff4edd369889c37829da08fe42b55d139

    • SHA512

      87405d4f2ae9693052ff2a914bbc3e79f1ee9c2cf92e92d8677b916b396ea77a89a789f36fa00d54bcbc60fd902347a35b041d67dce09808bfaf580b3387c0b8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks