General

  • Target

    02e97d5fb4526c7789a55e8487c7730aa6688b23bcfa142377c4e5fac337ddcc

  • Size

    60KB

  • Sample

    220212-n4qe9adfhp

  • MD5

    a9f8ae08ae5576cab4d7ee3f87b3d3de

  • SHA1

    3cf6f38285e8d303f5dfb1914b17ea309ae00e62

  • SHA256

    02e97d5fb4526c7789a55e8487c7730aa6688b23bcfa142377c4e5fac337ddcc

  • SHA512

    282d9ca60ef61e92440885eca9c0549f0febf24def3b6fe8a06c8e3c40bdefddef54cefe0fb4976f9a9eb197b7e25f38bb04e01d81659e23327da46dde5e6dae

Malware Config

Targets

    • Target

      02e97d5fb4526c7789a55e8487c7730aa6688b23bcfa142377c4e5fac337ddcc

    • Size

      60KB

    • MD5

      a9f8ae08ae5576cab4d7ee3f87b3d3de

    • SHA1

      3cf6f38285e8d303f5dfb1914b17ea309ae00e62

    • SHA256

      02e97d5fb4526c7789a55e8487c7730aa6688b23bcfa142377c4e5fac337ddcc

    • SHA512

      282d9ca60ef61e92440885eca9c0549f0febf24def3b6fe8a06c8e3c40bdefddef54cefe0fb4976f9a9eb197b7e25f38bb04e01d81659e23327da46dde5e6dae

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks