General

  • Target

    06d4f27d1873b81ee434f58617884e62b8cc41fa5feaf3c10c33ca61bc78b7e7

  • Size

    99KB

  • Sample

    220212-mlltnschej

  • MD5

    63705a0c88b16eb13a52f9a97e939b3f

  • SHA1

    ea5c88b3c868d41857ed285e11ddb616b4008b9c

  • SHA256

    06d4f27d1873b81ee434f58617884e62b8cc41fa5feaf3c10c33ca61bc78b7e7

  • SHA512

    0f8d4d98b44a1eea89ce88791f504a7f49795df2ff521330ed4173a9cf1516bda3a9a28983568a06f807ddeae7afdebe1125618cd5af453613da965735722e39

Malware Config

Targets

    • Target

      06d4f27d1873b81ee434f58617884e62b8cc41fa5feaf3c10c33ca61bc78b7e7

    • Size

      99KB

    • MD5

      63705a0c88b16eb13a52f9a97e939b3f

    • SHA1

      ea5c88b3c868d41857ed285e11ddb616b4008b9c

    • SHA256

      06d4f27d1873b81ee434f58617884e62b8cc41fa5feaf3c10c33ca61bc78b7e7

    • SHA512

      0f8d4d98b44a1eea89ce88791f504a7f49795df2ff521330ed4173a9cf1516bda3a9a28983568a06f807ddeae7afdebe1125618cd5af453613da965735722e39

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks