General

  • Target

    0af3d144a267791f1c23fca9ab6df987be6c23b3d61461666b3fd6132df483b8

  • Size

    60KB

  • Sample

    220212-kep7eaabb5

  • MD5

    ab12295fb8674c2df88a5903062a1c24

  • SHA1

    46150b16c74764e7fe90c799a07475264a9c9351

  • SHA256

    0af3d144a267791f1c23fca9ab6df987be6c23b3d61461666b3fd6132df483b8

  • SHA512

    7c0a931ed5faec9d539881d7570277fcfe7f42150b8942340efa0bcdd9e6dd34b796fc5349585ac28e8efe7b27dbf5b39a6bcb60d444081ff84d6cfddf5660f0

Malware Config

Targets

    • Target

      0af3d144a267791f1c23fca9ab6df987be6c23b3d61461666b3fd6132df483b8

    • Size

      60KB

    • MD5

      ab12295fb8674c2df88a5903062a1c24

    • SHA1

      46150b16c74764e7fe90c799a07475264a9c9351

    • SHA256

      0af3d144a267791f1c23fca9ab6df987be6c23b3d61461666b3fd6132df483b8

    • SHA512

      7c0a931ed5faec9d539881d7570277fcfe7f42150b8942340efa0bcdd9e6dd34b796fc5349585ac28e8efe7b27dbf5b39a6bcb60d444081ff84d6cfddf5660f0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks