General

  • Target

    06ed3918a3d4169db47075e428c3476eda9bc68ab74de1efe63efea2b707940d

  • Size

    60KB

  • Sample

    220212-mkjb6abca4

  • MD5

    59ddc36ba5f6bba4a8652f627c6b2f3d

  • SHA1

    a29ef12308ecb77f6aa352fdbbd7186d881d247f

  • SHA256

    06ed3918a3d4169db47075e428c3476eda9bc68ab74de1efe63efea2b707940d

  • SHA512

    3aefe825ee9959da2c9003e8eadeabe90d14e0db3eeb7e8092c8760f4a461bb64341c9479f183fdf9af2b13355d4eda7cd79d2cb2537b042dbcb57002ae0834d

Malware Config

Targets

    • Target

      06ed3918a3d4169db47075e428c3476eda9bc68ab74de1efe63efea2b707940d

    • Size

      60KB

    • MD5

      59ddc36ba5f6bba4a8652f627c6b2f3d

    • SHA1

      a29ef12308ecb77f6aa352fdbbd7186d881d247f

    • SHA256

      06ed3918a3d4169db47075e428c3476eda9bc68ab74de1efe63efea2b707940d

    • SHA512

      3aefe825ee9959da2c9003e8eadeabe90d14e0db3eeb7e8092c8760f4a461bb64341c9479f183fdf9af2b13355d4eda7cd79d2cb2537b042dbcb57002ae0834d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks