General

  • Target

    079bd5564fda2138a383db0a7477b5d70933514590d1ff383bcf08424888d59c

  • Size

    35KB

  • Sample

    220212-mcn8fabah9

  • MD5

    5efb42b9fdebeea249c1b3f5201f482e

  • SHA1

    ef1a925efbf5eb46fa5255ddd64a032bba58ed0c

  • SHA256

    079bd5564fda2138a383db0a7477b5d70933514590d1ff383bcf08424888d59c

  • SHA512

    3e71c3574b36902959f98b1addffe94b64066f28b062cb0973f1b307982295842b4f1c4afe581055bc5ec4ec7c75b2d8a264eed84d4a2f1d458f80251af37faf

Malware Config

Targets

    • Target

      079bd5564fda2138a383db0a7477b5d70933514590d1ff383bcf08424888d59c

    • Size

      35KB

    • MD5

      5efb42b9fdebeea249c1b3f5201f482e

    • SHA1

      ef1a925efbf5eb46fa5255ddd64a032bba58ed0c

    • SHA256

      079bd5564fda2138a383db0a7477b5d70933514590d1ff383bcf08424888d59c

    • SHA512

      3e71c3574b36902959f98b1addffe94b64066f28b062cb0973f1b307982295842b4f1c4afe581055bc5ec4ec7c75b2d8a264eed84d4a2f1d458f80251af37faf

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks