General

  • Target

    0b5e87d86da27d35cae9e3d906674da4d03b7d895380c65df0425326371898ae

  • Size

    60KB

  • Sample

    220212-j6h2qsbehk

  • MD5

    34c9af927931211b6f39de3e42d95e63

  • SHA1

    29185fdd7a2fbc75da923d386c8566746c52c78b

  • SHA256

    0b5e87d86da27d35cae9e3d906674da4d03b7d895380c65df0425326371898ae

  • SHA512

    0838abc2250ac4bc20724642c99f91a7c3456097c372ae76ce179a39771b081ae9e167cd7cf22281feada847f935c6618a62c343ac7afac974e5a1ac66a30ef7

Malware Config

Targets

    • Target

      0b5e87d86da27d35cae9e3d906674da4d03b7d895380c65df0425326371898ae

    • Size

      60KB

    • MD5

      34c9af927931211b6f39de3e42d95e63

    • SHA1

      29185fdd7a2fbc75da923d386c8566746c52c78b

    • SHA256

      0b5e87d86da27d35cae9e3d906674da4d03b7d895380c65df0425326371898ae

    • SHA512

      0838abc2250ac4bc20724642c99f91a7c3456097c372ae76ce179a39771b081ae9e167cd7cf22281feada847f935c6618a62c343ac7afac974e5a1ac66a30ef7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks