General

  • Target

    1929a4334e515f85bb2f32a9a9b0265f36210ccca7a4c43489c9951b1307831b

  • Size

    58KB

  • Sample

    220212-ddntmagfgn

  • MD5

    ccea97acfb44ffabbfd2d17ff530622b

  • SHA1

    880241c69defe62532d19eefaa38d640fa3b3e0b

  • SHA256

    1929a4334e515f85bb2f32a9a9b0265f36210ccca7a4c43489c9951b1307831b

  • SHA512

    df56c46a8acd47e433c4fb22f4fc5c675f192b1de3585325023a63fdf4f904956e95e1a9a5fb592b6128997e7c3173f56cb4143258bfa997c419c1edcd24a019

Malware Config

Targets

    • Target

      1929a4334e515f85bb2f32a9a9b0265f36210ccca7a4c43489c9951b1307831b

    • Size

      58KB

    • MD5

      ccea97acfb44ffabbfd2d17ff530622b

    • SHA1

      880241c69defe62532d19eefaa38d640fa3b3e0b

    • SHA256

      1929a4334e515f85bb2f32a9a9b0265f36210ccca7a4c43489c9951b1307831b

    • SHA512

      df56c46a8acd47e433c4fb22f4fc5c675f192b1de3585325023a63fdf4f904956e95e1a9a5fb592b6128997e7c3173f56cb4143258bfa997c419c1edcd24a019

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks