General

  • Target

    05c06fa12ba26e0c8c370fc235ca45d7eaca4f4a81976501b719411eaa8e2012

  • Size

    36KB

  • Sample

    220212-m1jb4abdh9

  • MD5

    aec2bd3bdadc071d4a1140f6ceca8861

  • SHA1

    a2e775b50754e1b93855910740fb039a102d3eac

  • SHA256

    05c06fa12ba26e0c8c370fc235ca45d7eaca4f4a81976501b719411eaa8e2012

  • SHA512

    91350a8f308062c7d408b17b0254a8a19316674d67311a6004a01a574d1800a6214972d1951da18eac83c2509bb7a4c4edacb12fa76a780db27f7402b1409549

Malware Config

Targets

    • Target

      05c06fa12ba26e0c8c370fc235ca45d7eaca4f4a81976501b719411eaa8e2012

    • Size

      36KB

    • MD5

      aec2bd3bdadc071d4a1140f6ceca8861

    • SHA1

      a2e775b50754e1b93855910740fb039a102d3eac

    • SHA256

      05c06fa12ba26e0c8c370fc235ca45d7eaca4f4a81976501b719411eaa8e2012

    • SHA512

      91350a8f308062c7d408b17b0254a8a19316674d67311a6004a01a574d1800a6214972d1951da18eac83c2509bb7a4c4edacb12fa76a780db27f7402b1409549

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks