General

  • Target

    06d666ec7c251840da96c96c4373e59ceb36d54a658b4c96c31fdcb94c200631

  • Size

    79KB

  • Sample

    220212-mleqcschdp

  • MD5

    e976f9a20eb9133ecdfeb05622483025

  • SHA1

    32c547aa45d3511bc0c78664017ad11683c92608

  • SHA256

    06d666ec7c251840da96c96c4373e59ceb36d54a658b4c96c31fdcb94c200631

  • SHA512

    550a11ee916e9ceccfb3b260ebfe8479972e44987e217b47ceff713a62ffc1eff9908ed8291e0cba864cd7e2a32b840264c66d09c1c6e0c17c166633f43004a7

Malware Config

Targets

    • Target

      06d666ec7c251840da96c96c4373e59ceb36d54a658b4c96c31fdcb94c200631

    • Size

      79KB

    • MD5

      e976f9a20eb9133ecdfeb05622483025

    • SHA1

      32c547aa45d3511bc0c78664017ad11683c92608

    • SHA256

      06d666ec7c251840da96c96c4373e59ceb36d54a658b4c96c31fdcb94c200631

    • SHA512

      550a11ee916e9ceccfb3b260ebfe8479972e44987e217b47ceff713a62ffc1eff9908ed8291e0cba864cd7e2a32b840264c66d09c1c6e0c17c166633f43004a7

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks