General

  • Target

    18b3ca063873e29e6106a5bd4584c642892d028f73bffad1d91087438094ee40

  • Size

    60KB

  • Sample

    220212-dke53afcb7

  • MD5

    d6c6b11fc0d4497251a6b3496479476a

  • SHA1

    63aafb6b0fc096da3c4ba9691a95ef74e7e4a2dc

  • SHA256

    18b3ca063873e29e6106a5bd4584c642892d028f73bffad1d91087438094ee40

  • SHA512

    e1be4d9817a9a52a457305c67032ee536d647fbea5c792ee861df8832f9b54b8ace9ecff008c0ce3bb6ab95523e90bef9bc0bb02d410829cf7f3361e00e0fd3f

Malware Config

Targets

    • Target

      18b3ca063873e29e6106a5bd4584c642892d028f73bffad1d91087438094ee40

    • Size

      60KB

    • MD5

      d6c6b11fc0d4497251a6b3496479476a

    • SHA1

      63aafb6b0fc096da3c4ba9691a95ef74e7e4a2dc

    • SHA256

      18b3ca063873e29e6106a5bd4584c642892d028f73bffad1d91087438094ee40

    • SHA512

      e1be4d9817a9a52a457305c67032ee536d647fbea5c792ee861df8832f9b54b8ace9ecff008c0ce3bb6ab95523e90bef9bc0bb02d410829cf7f3361e00e0fd3f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks