General

  • Target

    18c5e6f07b51362a280a3946a8a0b394bca76a95bd3ec2ad8bad2d34e2728e63

  • Size

    60KB

  • Sample

    220212-dh9lwsfca6

  • MD5

    1a4fc297393677ee9bb8c03c0cbff975

  • SHA1

    f91be0225b1cdc45baf135534263cc572658ae8c

  • SHA256

    18c5e6f07b51362a280a3946a8a0b394bca76a95bd3ec2ad8bad2d34e2728e63

  • SHA512

    a4961df38f1d9854f0988791240616fb1239f37b6d06c087c585fc6a6f9ecf88e1bca808ee032c1192a066b889ff467125ad21221ea489701c971ae9b2582fa4

Malware Config

Targets

    • Target

      18c5e6f07b51362a280a3946a8a0b394bca76a95bd3ec2ad8bad2d34e2728e63

    • Size

      60KB

    • MD5

      1a4fc297393677ee9bb8c03c0cbff975

    • SHA1

      f91be0225b1cdc45baf135534263cc572658ae8c

    • SHA256

      18c5e6f07b51362a280a3946a8a0b394bca76a95bd3ec2ad8bad2d34e2728e63

    • SHA512

      a4961df38f1d9854f0988791240616fb1239f37b6d06c087c585fc6a6f9ecf88e1bca808ee032c1192a066b889ff467125ad21221ea489701c971ae9b2582fa4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks