General

  • Target

    05eb3b612e3db48e0d74078e10d1ca7387ac4738377f772f28ec09a374b084e9

  • Size

    191KB

  • Sample

    220212-myv8wadahk

  • MD5

    caaa5c619cbfc65b0166ca9c7f954c32

  • SHA1

    409125f138db91ac088349099c99f8304bb3a6c2

  • SHA256

    05eb3b612e3db48e0d74078e10d1ca7387ac4738377f772f28ec09a374b084e9

  • SHA512

    007799b1f6c3a3442c4230f777656993ef6e4661752876fb42c95df24cb8339622745fd07e52c231f929fced698bd4f37131888d9a0fa20e482003309f31d15d

Malware Config

Targets

    • Target

      05eb3b612e3db48e0d74078e10d1ca7387ac4738377f772f28ec09a374b084e9

    • Size

      191KB

    • MD5

      caaa5c619cbfc65b0166ca9c7f954c32

    • SHA1

      409125f138db91ac088349099c99f8304bb3a6c2

    • SHA256

      05eb3b612e3db48e0d74078e10d1ca7387ac4738377f772f28ec09a374b084e9

    • SHA512

      007799b1f6c3a3442c4230f777656993ef6e4661752876fb42c95df24cb8339622745fd07e52c231f929fced698bd4f37131888d9a0fa20e482003309f31d15d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks