General

  • Target

    06d6965ed1591cd2a99767ccf45d99fccf8f4ea09b3a218e184659945c0d91b7

  • Size

    100KB

  • Sample

    220212-mlck1achdn

  • MD5

    2b44cf0f577701ae6ecb5c7b05688a07

  • SHA1

    97021b696da8bb1076e2501478f5cb7f606ed42b

  • SHA256

    06d6965ed1591cd2a99767ccf45d99fccf8f4ea09b3a218e184659945c0d91b7

  • SHA512

    6a6bf038c27161ecc549e63f87359e16c21f2a6cd40441cc4d6a94e55307bd93458967e56c19882f1e86c0428e64d30fd2fa830b344722e5daf9b727bfdea67d

Malware Config

Targets

    • Target

      06d6965ed1591cd2a99767ccf45d99fccf8f4ea09b3a218e184659945c0d91b7

    • Size

      100KB

    • MD5

      2b44cf0f577701ae6ecb5c7b05688a07

    • SHA1

      97021b696da8bb1076e2501478f5cb7f606ed42b

    • SHA256

      06d6965ed1591cd2a99767ccf45d99fccf8f4ea09b3a218e184659945c0d91b7

    • SHA512

      6a6bf038c27161ecc549e63f87359e16c21f2a6cd40441cc4d6a94e55307bd93458967e56c19882f1e86c0428e64d30fd2fa830b344722e5daf9b727bfdea67d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks