General

  • Target

    063c108b2701eb8b15cf12d5f8df70dee83662135c19c67b786178a95f6d543c

  • Size

    60KB

  • Sample

    220212-ms1w6sdacn

  • MD5

    be24439e88c1a8be44c4f8a8d53bfb09

  • SHA1

    6aa2a766d5eecfa412bdaa52ee0adab21a422ed3

  • SHA256

    063c108b2701eb8b15cf12d5f8df70dee83662135c19c67b786178a95f6d543c

  • SHA512

    c396e9cf97730597f7c2572cb3055db3eaf2094b6597d036c2d545c9421988e4599f88383771adb4dc9f8c6dea669468c35b8ef628730162cd9a4d436bc3722b

Malware Config

Targets

    • Target

      063c108b2701eb8b15cf12d5f8df70dee83662135c19c67b786178a95f6d543c

    • Size

      60KB

    • MD5

      be24439e88c1a8be44c4f8a8d53bfb09

    • SHA1

      6aa2a766d5eecfa412bdaa52ee0adab21a422ed3

    • SHA256

      063c108b2701eb8b15cf12d5f8df70dee83662135c19c67b786178a95f6d543c

    • SHA512

      c396e9cf97730597f7c2572cb3055db3eaf2094b6597d036c2d545c9421988e4599f88383771adb4dc9f8c6dea669468c35b8ef628730162cd9a4d436bc3722b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks