General

  • Target

    0e1646c3c159bffedeaf02e46ddefd6a8cb8e4c93df798327ab074f834500b96

  • Size

    60KB

  • Sample

    220212-h357eshde7

  • MD5

    42399bca1551438499ff7d637913a651

  • SHA1

    666a9668eda24d8a45cea7495f32ba901a5d5c96

  • SHA256

    0e1646c3c159bffedeaf02e46ddefd6a8cb8e4c93df798327ab074f834500b96

  • SHA512

    9c3179e9e561de1e25b31ccfb20de077acb62535d1a297c997b783dd256c6eba6ee88bd01291e5d865143275b49e7503076797edfaf2331cb71df4604d01693f

Malware Config

Targets

    • Target

      0e1646c3c159bffedeaf02e46ddefd6a8cb8e4c93df798327ab074f834500b96

    • Size

      60KB

    • MD5

      42399bca1551438499ff7d637913a651

    • SHA1

      666a9668eda24d8a45cea7495f32ba901a5d5c96

    • SHA256

      0e1646c3c159bffedeaf02e46ddefd6a8cb8e4c93df798327ab074f834500b96

    • SHA512

      9c3179e9e561de1e25b31ccfb20de077acb62535d1a297c997b783dd256c6eba6ee88bd01291e5d865143275b49e7503076797edfaf2331cb71df4604d01693f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks