General

  • Target

    056a05d1f4de5bd34e4cfea921442240e6320988984b9741aa9a7b4f912ee0be

  • Size

    60KB

  • Sample

    220212-m6c29sdbgk

  • MD5

    9b3f225b6e59930020e0a1af9dce7147

  • SHA1

    1758bd8a63048b7e2e5c7afe17e32b32f0170a9a

  • SHA256

    056a05d1f4de5bd34e4cfea921442240e6320988984b9741aa9a7b4f912ee0be

  • SHA512

    3956da861d4eb33eaca6269de7269db74808e93a4fe08536cb2275cf3a99545b08e5d2205b75b469b9749265e240b15f251507d77b091627bbe515050053fb07

Malware Config

Targets

    • Target

      056a05d1f4de5bd34e4cfea921442240e6320988984b9741aa9a7b4f912ee0be

    • Size

      60KB

    • MD5

      9b3f225b6e59930020e0a1af9dce7147

    • SHA1

      1758bd8a63048b7e2e5c7afe17e32b32f0170a9a

    • SHA256

      056a05d1f4de5bd34e4cfea921442240e6320988984b9741aa9a7b4f912ee0be

    • SHA512

      3956da861d4eb33eaca6269de7269db74808e93a4fe08536cb2275cf3a99545b08e5d2205b75b469b9749265e240b15f251507d77b091627bbe515050053fb07

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks