General

  • Target

    1299ae7de370a0bb491fdff4c88eb69aa742ddfb6777db1f1b618155d895f6cd

  • Size

    35KB

  • Sample

    220212-f62bjaaban

  • MD5

    02728ad0845544fe22cbdabc81df10a2

  • SHA1

    86385293071db358fc219f9eb1cf49ceedde88c9

  • SHA256

    1299ae7de370a0bb491fdff4c88eb69aa742ddfb6777db1f1b618155d895f6cd

  • SHA512

    07b6e9409064539d1934d38a34018b3492770980dccad5c4c902b6c72aae77ebd943c4bf400c8531cea286b4ae49f607fe2ccffb9e1eff94d63d9e84654a433d

Malware Config

Targets

    • Target

      1299ae7de370a0bb491fdff4c88eb69aa742ddfb6777db1f1b618155d895f6cd

    • Size

      35KB

    • MD5

      02728ad0845544fe22cbdabc81df10a2

    • SHA1

      86385293071db358fc219f9eb1cf49ceedde88c9

    • SHA256

      1299ae7de370a0bb491fdff4c88eb69aa742ddfb6777db1f1b618155d895f6cd

    • SHA512

      07b6e9409064539d1934d38a34018b3492770980dccad5c4c902b6c72aae77ebd943c4bf400c8531cea286b4ae49f607fe2ccffb9e1eff94d63d9e84654a433d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks