General

  • Target

    05e8ed1b087700a48b248c8eac061f1338c0fea554baadacbb13d51bbd5742d1

  • Size

    58KB

  • Sample

    220212-my46sadahm

  • MD5

    e80294f8e11ff13e3b87635eb70c33fe

  • SHA1

    c610a469ba95aaded4bc4a95c15774c304aae7ab

  • SHA256

    05e8ed1b087700a48b248c8eac061f1338c0fea554baadacbb13d51bbd5742d1

  • SHA512

    6562d1d1bb5c4e8cae87730ee44d266f581092bab8b8a8b50c59a94d3516e065d5e848edffea6e79f1dd27b7de8f1edf1e554ec64fb682a125a69f21a727ffd9

Malware Config

Targets

    • Target

      05e8ed1b087700a48b248c8eac061f1338c0fea554baadacbb13d51bbd5742d1

    • Size

      58KB

    • MD5

      e80294f8e11ff13e3b87635eb70c33fe

    • SHA1

      c610a469ba95aaded4bc4a95c15774c304aae7ab

    • SHA256

      05e8ed1b087700a48b248c8eac061f1338c0fea554baadacbb13d51bbd5742d1

    • SHA512

      6562d1d1bb5c4e8cae87730ee44d266f581092bab8b8a8b50c59a94d3516e065d5e848edffea6e79f1dd27b7de8f1edf1e554ec64fb682a125a69f21a727ffd9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks