General

  • Target

    06b55053ea0cbc0819b812502aed2bb0cefbbbd93562c6d710892ba425a83e4e

  • Size

    101KB

  • Sample

    220212-mnm5hschfp

  • MD5

    a1ceb34b98c219cb17f2e5b15b888ad5

  • SHA1

    85395e0c467c80f2e84473411462e4174acbd31d

  • SHA256

    06b55053ea0cbc0819b812502aed2bb0cefbbbd93562c6d710892ba425a83e4e

  • SHA512

    7672041da6435b23ddf6f079e812189f5c19df362dae8340062ad76ff05192b10bf55d1fbe806f53aad13857c7f1d855a2587e3c90f69e8eeb8ee9b613a0db4f

Malware Config

Targets

    • Target

      06b55053ea0cbc0819b812502aed2bb0cefbbbd93562c6d710892ba425a83e4e

    • Size

      101KB

    • MD5

      a1ceb34b98c219cb17f2e5b15b888ad5

    • SHA1

      85395e0c467c80f2e84473411462e4174acbd31d

    • SHA256

      06b55053ea0cbc0819b812502aed2bb0cefbbbd93562c6d710892ba425a83e4e

    • SHA512

      7672041da6435b23ddf6f079e812189f5c19df362dae8340062ad76ff05192b10bf55d1fbe806f53aad13857c7f1d855a2587e3c90f69e8eeb8ee9b613a0db4f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks