General

  • Target

    0560c98dcf70d0decc66409425e45cf48e33d85372ce9b2122d89d0b0885764f

  • Size

    58KB

  • Sample

    220212-m6zw2abef3

  • MD5

    db8ccb0ae4b023d40983a0facbbe8881

  • SHA1

    8c8b12618fc2df689f9f61e9409d3a0844c7033b

  • SHA256

    0560c98dcf70d0decc66409425e45cf48e33d85372ce9b2122d89d0b0885764f

  • SHA512

    05b8cf338035be1a28930b92e3af48b99acaf094df142400e9474d4626c9377ad925deb9408ac0e8cc3585acf32b291bf1d945b0b40d93da5a89a0c80b5532c8

Malware Config

Targets

    • Target

      0560c98dcf70d0decc66409425e45cf48e33d85372ce9b2122d89d0b0885764f

    • Size

      58KB

    • MD5

      db8ccb0ae4b023d40983a0facbbe8881

    • SHA1

      8c8b12618fc2df689f9f61e9409d3a0844c7033b

    • SHA256

      0560c98dcf70d0decc66409425e45cf48e33d85372ce9b2122d89d0b0885764f

    • SHA512

      05b8cf338035be1a28930b92e3af48b99acaf094df142400e9474d4626c9377ad925deb9408ac0e8cc3585acf32b291bf1d945b0b40d93da5a89a0c80b5532c8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks