General

  • Target

    0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852

  • Size

    60KB

  • Sample

    220212-h3thmahde4

  • MD5

    f30aca1d2b86739088e4f9bb999912d5

  • SHA1

    723503036b69e20a91c79f87369e9541c33cddfc

  • SHA256

    0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852

  • SHA512

    755613a606ad8821ffe4ab187f651bd5c2cb25a67e8aaf9f42ed9977aa97dd342b407280e8740241b83d326084f086365387b27aabd2fc2f6be32ea1e95add53

Malware Config

Targets

    • Target

      0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852

    • Size

      60KB

    • MD5

      f30aca1d2b86739088e4f9bb999912d5

    • SHA1

      723503036b69e20a91c79f87369e9541c33cddfc

    • SHA256

      0e18112d15ddcbdf11c9e0c06e6b4e6d5613c84b38f767702c794841c1a37852

    • SHA512

      755613a606ad8821ffe4ab187f651bd5c2cb25a67e8aaf9f42ed9977aa97dd342b407280e8740241b83d326084f086365387b27aabd2fc2f6be32ea1e95add53

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks