General

  • Target

    0e98721d59479ca3a39778b2bb347570cb493f2f2e56ad52b27b435319a6e429

  • Size

    35KB

  • Sample

    220212-hwfyyshcg4

  • MD5

    d6536b1c3a6ec1e6d0e986ed9c1669f2

  • SHA1

    64ba2176a13a9fc7ec66465f451d3e223c22ec71

  • SHA256

    0e98721d59479ca3a39778b2bb347570cb493f2f2e56ad52b27b435319a6e429

  • SHA512

    2958be468d235f313fecb574674a150371ed2a5d6e74c693693aae701655562a1e5683bbfd8fc737acdaf4df273738408bce5485569b8878e95b5cf52efb252e

Malware Config

Targets

    • Target

      0e98721d59479ca3a39778b2bb347570cb493f2f2e56ad52b27b435319a6e429

    • Size

      35KB

    • MD5

      d6536b1c3a6ec1e6d0e986ed9c1669f2

    • SHA1

      64ba2176a13a9fc7ec66465f451d3e223c22ec71

    • SHA256

      0e98721d59479ca3a39778b2bb347570cb493f2f2e56ad52b27b435319a6e429

    • SHA512

      2958be468d235f313fecb574674a150371ed2a5d6e74c693693aae701655562a1e5683bbfd8fc737acdaf4df273738408bce5485569b8878e95b5cf52efb252e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks