General

  • Target

    04f48a6d3ab5e7a3d39c2ebc66bbc3acbfd24f286c6d26db47789d73bbbcdca4

  • Size

    58KB

  • Sample

    220212-nby7padcdr

  • MD5

    003b30373ad92f672b8dcd3c4e21341e

  • SHA1

    98006de89f6bd37914552d855a2818d0514bce89

  • SHA256

    04f48a6d3ab5e7a3d39c2ebc66bbc3acbfd24f286c6d26db47789d73bbbcdca4

  • SHA512

    dad5c4f1205cf5e0f810e1c6ddadbe8e7ba55628cb8707615974814bce5508cc9340dbc3adf5a7d99f6314b15dec39c7fe53b7c0a90d12e86f786ce365b694d1

Malware Config

Targets

    • Target

      04f48a6d3ab5e7a3d39c2ebc66bbc3acbfd24f286c6d26db47789d73bbbcdca4

    • Size

      58KB

    • MD5

      003b30373ad92f672b8dcd3c4e21341e

    • SHA1

      98006de89f6bd37914552d855a2818d0514bce89

    • SHA256

      04f48a6d3ab5e7a3d39c2ebc66bbc3acbfd24f286c6d26db47789d73bbbcdca4

    • SHA512

      dad5c4f1205cf5e0f810e1c6ddadbe8e7ba55628cb8707615974814bce5508cc9340dbc3adf5a7d99f6314b15dec39c7fe53b7c0a90d12e86f786ce365b694d1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks