General

  • Target

    02eb66e4297ca3f42391071883afe5cab000eab469e432f47f4bfdfda060ab77

  • Size

    60KB

  • Sample

    220212-n4h16scab4

  • MD5

    c91e268c4270749257d3fc22d1350764

  • SHA1

    826c5a394be048392c4b17b72793126e622a59b7

  • SHA256

    02eb66e4297ca3f42391071883afe5cab000eab469e432f47f4bfdfda060ab77

  • SHA512

    31aabf5001b030bf88227e1e501c6c6cb0b29f0a890a664ef0f074c8ca80b20164156d9e86fd8dcfd5231d0d1c8211427c421aa7bb2d668b6c6c9c5c5083e1a1

Malware Config

Targets

    • Target

      02eb66e4297ca3f42391071883afe5cab000eab469e432f47f4bfdfda060ab77

    • Size

      60KB

    • MD5

      c91e268c4270749257d3fc22d1350764

    • SHA1

      826c5a394be048392c4b17b72793126e622a59b7

    • SHA256

      02eb66e4297ca3f42391071883afe5cab000eab469e432f47f4bfdfda060ab77

    • SHA512

      31aabf5001b030bf88227e1e501c6c6cb0b29f0a890a664ef0f074c8ca80b20164156d9e86fd8dcfd5231d0d1c8211427c421aa7bb2d668b6c6c9c5c5083e1a1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks