General

  • Target

    060430bf5a317aad42dbc964c406e3a9a66a7525d60136d55f0dd5901b81a5b8

  • Size

    58KB

  • Sample

    220212-mxd8zadafp

  • MD5

    b56d1b4abf55a0b333f145dad7b52ecb

  • SHA1

    925d2dd7f9cfa1b53a27724cf9852d6cc6725568

  • SHA256

    060430bf5a317aad42dbc964c406e3a9a66a7525d60136d55f0dd5901b81a5b8

  • SHA512

    16d049f21ccb48bb845d1e69ac233a15236035c48b9677992c48c8a14b8229e9edc6ba6792a56fae5c74272a17c476840f009cf1100b27826927f1b4f8ee631d

Malware Config

Targets

    • Target

      060430bf5a317aad42dbc964c406e3a9a66a7525d60136d55f0dd5901b81a5b8

    • Size

      58KB

    • MD5

      b56d1b4abf55a0b333f145dad7b52ecb

    • SHA1

      925d2dd7f9cfa1b53a27724cf9852d6cc6725568

    • SHA256

      060430bf5a317aad42dbc964c406e3a9a66a7525d60136d55f0dd5901b81a5b8

    • SHA512

      16d049f21ccb48bb845d1e69ac233a15236035c48b9677992c48c8a14b8229e9edc6ba6792a56fae5c74272a17c476840f009cf1100b27826927f1b4f8ee631d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks