General

  • Target

    05edb4518be265adf5b991ff59f66d40c610850c1eb7a4f9f13d7c9531f66b35

  • Size

    99KB

  • Sample

    220212-mys4hsbdf7

  • MD5

    63bb952212746c3198befa6ba80feff7

  • SHA1

    ffac92ba604ad206ed80230ed7ebbd69ce18e7d1

  • SHA256

    05edb4518be265adf5b991ff59f66d40c610850c1eb7a4f9f13d7c9531f66b35

  • SHA512

    6b1bd1a674d7919c55cef58168f4728e5e3e721d050ff2e6afd14b8746e78b484269a9637d947194b73a25fde18058fba238096cb08db60e4ea29dfbc2ab5766

Malware Config

Targets

    • Target

      05edb4518be265adf5b991ff59f66d40c610850c1eb7a4f9f13d7c9531f66b35

    • Size

      99KB

    • MD5

      63bb952212746c3198befa6ba80feff7

    • SHA1

      ffac92ba604ad206ed80230ed7ebbd69ce18e7d1

    • SHA256

      05edb4518be265adf5b991ff59f66d40c610850c1eb7a4f9f13d7c9531f66b35

    • SHA512

      6b1bd1a674d7919c55cef58168f4728e5e3e721d050ff2e6afd14b8746e78b484269a9637d947194b73a25fde18058fba238096cb08db60e4ea29dfbc2ab5766

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks