General

  • Target

    0e06b255eb03ff2594dd1082eed077e15a3a3f8cb87d52c2e7fb7a27291eb938

  • Size

    36KB

  • Sample

    220212-h4caqsbabm

  • MD5

    37dff7807dc7f025bd3600167897a678

  • SHA1

    24a71f6085b3c3703a6a232086f779af17fb8f43

  • SHA256

    0e06b255eb03ff2594dd1082eed077e15a3a3f8cb87d52c2e7fb7a27291eb938

  • SHA512

    5d9bdd593f035038af2bccb684276b6b2beac55ee05dde1ee2a512dbe170fc9caebe24ac397ae6f9d814a5f97d67de8dd50fa52882038d82879393918e4aec4e

Malware Config

Targets

    • Target

      0e06b255eb03ff2594dd1082eed077e15a3a3f8cb87d52c2e7fb7a27291eb938

    • Size

      36KB

    • MD5

      37dff7807dc7f025bd3600167897a678

    • SHA1

      24a71f6085b3c3703a6a232086f779af17fb8f43

    • SHA256

      0e06b255eb03ff2594dd1082eed077e15a3a3f8cb87d52c2e7fb7a27291eb938

    • SHA512

      5d9bdd593f035038af2bccb684276b6b2beac55ee05dde1ee2a512dbe170fc9caebe24ac397ae6f9d814a5f97d67de8dd50fa52882038d82879393918e4aec4e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks