General

  • Target

    0862d6560664c8f7aafbafcfdd57df2311beaa0087d5184a9ef76dd646e8ba9c

  • Size

    36KB

  • Sample

    220212-l2ejvscefm

  • MD5

    4b8ed849760f3649cb445040b22457b8

  • SHA1

    b9551693acf8decd74542304994be95f2181fba6

  • SHA256

    0862d6560664c8f7aafbafcfdd57df2311beaa0087d5184a9ef76dd646e8ba9c

  • SHA512

    a8fc26cdb6d0b74193d4b866d646bda25ad22f2c84bc85e544d7621b30dd09aaf8413741a70d810f376391fa09020348dea82a2aaccee4e72f6b0e5e2140e236

Malware Config

Targets

    • Target

      0862d6560664c8f7aafbafcfdd57df2311beaa0087d5184a9ef76dd646e8ba9c

    • Size

      36KB

    • MD5

      4b8ed849760f3649cb445040b22457b8

    • SHA1

      b9551693acf8decd74542304994be95f2181fba6

    • SHA256

      0862d6560664c8f7aafbafcfdd57df2311beaa0087d5184a9ef76dd646e8ba9c

    • SHA512

      a8fc26cdb6d0b74193d4b866d646bda25ad22f2c84bc85e544d7621b30dd09aaf8413741a70d810f376391fa09020348dea82a2aaccee4e72f6b0e5e2140e236

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks