General

  • Target

    06031671cc98e9fd76543a44f9ffff750bcaa4fca240b66ef0c933963dee7081

  • Size

    60KB

  • Sample

    220212-mxqa8sdagj

  • MD5

    8671c044fd45b2528dbd2f4bbf68c06c

  • SHA1

    6363c371d4b274a9529238fa340ed852a8aa5c03

  • SHA256

    06031671cc98e9fd76543a44f9ffff750bcaa4fca240b66ef0c933963dee7081

  • SHA512

    ecdb6c58fe7489a63816760087653c82bd9e1642899b0c2a1a96b87d8cf496d9ead203b7f6fc0207d7f619eb0016d456f6180739f8cf6510113bb69fdefb6e09

Malware Config

Targets

    • Target

      06031671cc98e9fd76543a44f9ffff750bcaa4fca240b66ef0c933963dee7081

    • Size

      60KB

    • MD5

      8671c044fd45b2528dbd2f4bbf68c06c

    • SHA1

      6363c371d4b274a9529238fa340ed852a8aa5c03

    • SHA256

      06031671cc98e9fd76543a44f9ffff750bcaa4fca240b66ef0c933963dee7081

    • SHA512

      ecdb6c58fe7489a63816760087653c82bd9e1642899b0c2a1a96b87d8cf496d9ead203b7f6fc0207d7f619eb0016d456f6180739f8cf6510113bb69fdefb6e09

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks