General

  • Target

    0eba10939fd3b4737d0ee1609b67b58d845c52343b10ae250f583b07c8591230

  • Size

    58KB

  • Sample

    220212-hvbmvahce9

  • MD5

    27083f7b335a58607c9ddf057aa629c6

  • SHA1

    ae20863eb541be3599f98884b0c985963171199b

  • SHA256

    0eba10939fd3b4737d0ee1609b67b58d845c52343b10ae250f583b07c8591230

  • SHA512

    5cd6f6c89e75f36e1c72c55286f389997fae8baf37cdd16ddc1f4d09f388253e7d276468b40b62b51f256fe32ecc3ebce7e3eb831f257c41bfd42515afc26d94

Malware Config

Targets

    • Target

      0eba10939fd3b4737d0ee1609b67b58d845c52343b10ae250f583b07c8591230

    • Size

      58KB

    • MD5

      27083f7b335a58607c9ddf057aa629c6

    • SHA1

      ae20863eb541be3599f98884b0c985963171199b

    • SHA256

      0eba10939fd3b4737d0ee1609b67b58d845c52343b10ae250f583b07c8591230

    • SHA512

      5cd6f6c89e75f36e1c72c55286f389997fae8baf37cdd16ddc1f4d09f388253e7d276468b40b62b51f256fe32ecc3ebce7e3eb831f257c41bfd42515afc26d94

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks