General

  • Target

    04e0f082c6274ba406063e11597459301b12d8e9168f168a58f2801efe5d35cf

  • Size

    58KB

  • Sample

    220212-ncqlyadcer

  • MD5

    04a977278a8e308e8d30d383cab8efd2

  • SHA1

    4950d6516243a763ff82b462f6be612a773388b7

  • SHA256

    04e0f082c6274ba406063e11597459301b12d8e9168f168a58f2801efe5d35cf

  • SHA512

    cc0ddcf6532069175b89b663cf31f527289849c2e0e997c7cadd23fc6c03c1576d07b78ff7b9c349825f636d2a7bdde55b9bd1157ba9a6915146e7de211de083

Malware Config

Targets

    • Target

      04e0f082c6274ba406063e11597459301b12d8e9168f168a58f2801efe5d35cf

    • Size

      58KB

    • MD5

      04a977278a8e308e8d30d383cab8efd2

    • SHA1

      4950d6516243a763ff82b462f6be612a773388b7

    • SHA256

      04e0f082c6274ba406063e11597459301b12d8e9168f168a58f2801efe5d35cf

    • SHA512

      cc0ddcf6532069175b89b663cf31f527289849c2e0e997c7cadd23fc6c03c1576d07b78ff7b9c349825f636d2a7bdde55b9bd1157ba9a6915146e7de211de083

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks