General

  • Target

    0536bca31a8fe772c9c7d3f7ef4a39beaf76e838f674bc30271f1fbcd5c85d34

  • Size

    60KB

  • Sample

    220212-m8635abeh7

  • MD5

    1f786a0982b95d207edb2b281ff5df16

  • SHA1

    a549458ba31834d8b6319acc926f97bb4ed59f4d

  • SHA256

    0536bca31a8fe772c9c7d3f7ef4a39beaf76e838f674bc30271f1fbcd5c85d34

  • SHA512

    6dbfca6510af9ffded05ff2e8c4d15993708b8ae7de7349b7a1c750129aee62f69faa4267d25db7d16c47c456fa28afb284d481a0fc5f98c377f88e148ef4442

Malware Config

Targets

    • Target

      0536bca31a8fe772c9c7d3f7ef4a39beaf76e838f674bc30271f1fbcd5c85d34

    • Size

      60KB

    • MD5

      1f786a0982b95d207edb2b281ff5df16

    • SHA1

      a549458ba31834d8b6319acc926f97bb4ed59f4d

    • SHA256

      0536bca31a8fe772c9c7d3f7ef4a39beaf76e838f674bc30271f1fbcd5c85d34

    • SHA512

      6dbfca6510af9ffded05ff2e8c4d15993708b8ae7de7349b7a1c750129aee62f69faa4267d25db7d16c47c456fa28afb284d481a0fc5f98c377f88e148ef4442

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks