General

  • Target

    06be5790822db4f0e5d897e67d446d7fe91c04fdf9aeb698b4d2e21b4bb72a4b

  • Size

    60KB

  • Sample

    220212-mm74asbcd7

  • MD5

    98277bd1adff6b1265332dcce9ba70bd

  • SHA1

    4cf764c6743f556ae168758b39e50266aceabc72

  • SHA256

    06be5790822db4f0e5d897e67d446d7fe91c04fdf9aeb698b4d2e21b4bb72a4b

  • SHA512

    3d6204c817d1007d45d4c733b03cf43890044af71113ee946c7dffa5f1e09f4f024d4eee6692552444297b7771b51c201c06200d4e73efad5b3e90554e894e79

Malware Config

Targets

    • Target

      06be5790822db4f0e5d897e67d446d7fe91c04fdf9aeb698b4d2e21b4bb72a4b

    • Size

      60KB

    • MD5

      98277bd1adff6b1265332dcce9ba70bd

    • SHA1

      4cf764c6743f556ae168758b39e50266aceabc72

    • SHA256

      06be5790822db4f0e5d897e67d446d7fe91c04fdf9aeb698b4d2e21b4bb72a4b

    • SHA512

      3d6204c817d1007d45d4c733b03cf43890044af71113ee946c7dffa5f1e09f4f024d4eee6692552444297b7771b51c201c06200d4e73efad5b3e90554e894e79

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks