General

  • Target

    05536364c1dae7dd23c44f4925207888c4b039a1c4368dba74c0910c42df6948

  • Size

    99KB

  • Sample

    220212-m7g3lsdbhm

  • MD5

    863c77c42d274290c0f2302fd89468e5

  • SHA1

    69c3a4931455319b2afc2d267566d80f062d20af

  • SHA256

    05536364c1dae7dd23c44f4925207888c4b039a1c4368dba74c0910c42df6948

  • SHA512

    894b0638b5d4f7b012668d26b8c9dc1133bc37d2cdb1caee82125f0eb74fa008e7534a026913cb8284e1e8042fb70268c56371a095eff001d6e749ece9bdc734

Malware Config

Targets

    • Target

      05536364c1dae7dd23c44f4925207888c4b039a1c4368dba74c0910c42df6948

    • Size

      99KB

    • MD5

      863c77c42d274290c0f2302fd89468e5

    • SHA1

      69c3a4931455319b2afc2d267566d80f062d20af

    • SHA256

      05536364c1dae7dd23c44f4925207888c4b039a1c4368dba74c0910c42df6948

    • SHA512

      894b0638b5d4f7b012668d26b8c9dc1133bc37d2cdb1caee82125f0eb74fa008e7534a026913cb8284e1e8042fb70268c56371a095eff001d6e749ece9bdc734

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks