General

  • Target

    0eeff58b59717ee3a8450d46dda3b69f883e5c390aded513124910924afb892f

  • Size

    58KB

  • Sample

    220212-hq51wshcb2

  • MD5

    6dec303410b23750c6fb9e6d24462409

  • SHA1

    1a93461911e13ceaee7f21896cda68f135efb3c9

  • SHA256

    0eeff58b59717ee3a8450d46dda3b69f883e5c390aded513124910924afb892f

  • SHA512

    75e64f885db9739d394d06501a7353255192e6b3b63dc4b0b09a164e8bd51c7b9961797488f57f9d10c048f635fa1ce1135c4f2d70795a8edf7712ec85822646

Malware Config

Targets

    • Target

      0eeff58b59717ee3a8450d46dda3b69f883e5c390aded513124910924afb892f

    • Size

      58KB

    • MD5

      6dec303410b23750c6fb9e6d24462409

    • SHA1

      1a93461911e13ceaee7f21896cda68f135efb3c9

    • SHA256

      0eeff58b59717ee3a8450d46dda3b69f883e5c390aded513124910924afb892f

    • SHA512

      75e64f885db9739d394d06501a7353255192e6b3b63dc4b0b09a164e8bd51c7b9961797488f57f9d10c048f635fa1ce1135c4f2d70795a8edf7712ec85822646

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks