General

  • Target

    0540ed18ac984764ddb9f1a90d52e83d1ab98d9e24bc875799785f411afdfe90

  • Size

    35KB

  • Sample

    220212-m8fwyadcan

  • MD5

    dc2ffea6aa5d6a2cb88de7e235c6e5af

  • SHA1

    6003d6bf212dd54afb79ddf0c0410396815c17d3

  • SHA256

    0540ed18ac984764ddb9f1a90d52e83d1ab98d9e24bc875799785f411afdfe90

  • SHA512

    7ad48a0b5782344e4110b1d1fdbe7d816ec9a81ca199b5e08511a6c9b2574a9d13c442a0c97a609e8a27e44b7020490545b6ddfcfbbc0ccdebb80276d3616eba

Malware Config

Targets

    • Target

      0540ed18ac984764ddb9f1a90d52e83d1ab98d9e24bc875799785f411afdfe90

    • Size

      35KB

    • MD5

      dc2ffea6aa5d6a2cb88de7e235c6e5af

    • SHA1

      6003d6bf212dd54afb79ddf0c0410396815c17d3

    • SHA256

      0540ed18ac984764ddb9f1a90d52e83d1ab98d9e24bc875799785f411afdfe90

    • SHA512

      7ad48a0b5782344e4110b1d1fdbe7d816ec9a81ca199b5e08511a6c9b2574a9d13c442a0c97a609e8a27e44b7020490545b6ddfcfbbc0ccdebb80276d3616eba

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks