General

  • Target

    05bf3023d6dd9360b1ba89a3104a73cb98c1f62f0065a713f514929583f3602e

  • Size

    60KB

  • Sample

    220212-m1k6pabea2

  • MD5

    3a07c7e11febe7daadffc796cca478e6

  • SHA1

    970a3309122a7cabe6a2b363edee279076c84a94

  • SHA256

    05bf3023d6dd9360b1ba89a3104a73cb98c1f62f0065a713f514929583f3602e

  • SHA512

    2c9f9866a280d8680827a7b7db126a8aa18a7b8de46652a97b6f038d6cacad906713786402cdfbd461eac264d51aac662abc33b64738b2a3dcbece28d7e4fd36

Malware Config

Targets

    • Target

      05bf3023d6dd9360b1ba89a3104a73cb98c1f62f0065a713f514929583f3602e

    • Size

      60KB

    • MD5

      3a07c7e11febe7daadffc796cca478e6

    • SHA1

      970a3309122a7cabe6a2b363edee279076c84a94

    • SHA256

      05bf3023d6dd9360b1ba89a3104a73cb98c1f62f0065a713f514929583f3602e

    • SHA512

      2c9f9866a280d8680827a7b7db126a8aa18a7b8de46652a97b6f038d6cacad906713786402cdfbd461eac264d51aac662abc33b64738b2a3dcbece28d7e4fd36

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks