General

  • Target

    0e2929354eb6dcda5a0765abbd69bbd2d19d37febeb615711ac31b8aa3d038ee

  • Size

    58KB

  • Sample

    220212-h2b7yshdc6

  • MD5

    b4235aeb10f7fa4cb2076a67da0886c8

  • SHA1

    d734af3257284d93c390243a948c848ddcac956d

  • SHA256

    0e2929354eb6dcda5a0765abbd69bbd2d19d37febeb615711ac31b8aa3d038ee

  • SHA512

    514d409d7f5da78636a21541a04b8152f35520945a260c5706d2dbc749133ed117d1bbb2c609209e90903f3ca12c4d93a08f62140da1b3476e0a16c38463f51a

Malware Config

Targets

    • Target

      0e2929354eb6dcda5a0765abbd69bbd2d19d37febeb615711ac31b8aa3d038ee

    • Size

      58KB

    • MD5

      b4235aeb10f7fa4cb2076a67da0886c8

    • SHA1

      d734af3257284d93c390243a948c848ddcac956d

    • SHA256

      0e2929354eb6dcda5a0765abbd69bbd2d19d37febeb615711ac31b8aa3d038ee

    • SHA512

      514d409d7f5da78636a21541a04b8152f35520945a260c5706d2dbc749133ed117d1bbb2c609209e90903f3ca12c4d93a08f62140da1b3476e0a16c38463f51a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks