General

  • Target

    04aad5cb6bcb36050d6d5b1c4cd4d6f796d1756151b4ed3e63f690af6fbf30bf

  • Size

    60KB

  • Sample

    220212-nfa1nabff4

  • MD5

    153c40aa205dd96c80e4fc1382e83801

  • SHA1

    a43de24add9e7921c7f58886d7502e94481356ab

  • SHA256

    04aad5cb6bcb36050d6d5b1c4cd4d6f796d1756151b4ed3e63f690af6fbf30bf

  • SHA512

    450c60eca6beaa600e2d47351f14d9840499bc5813fe186a88d56d9561122c0586a891b19f88bc0c4e0192c8741a8837e10e19540440ff96e267a08316a2d2c3

Malware Config

Targets

    • Target

      04aad5cb6bcb36050d6d5b1c4cd4d6f796d1756151b4ed3e63f690af6fbf30bf

    • Size

      60KB

    • MD5

      153c40aa205dd96c80e4fc1382e83801

    • SHA1

      a43de24add9e7921c7f58886d7502e94481356ab

    • SHA256

      04aad5cb6bcb36050d6d5b1c4cd4d6f796d1756151b4ed3e63f690af6fbf30bf

    • SHA512

      450c60eca6beaa600e2d47351f14d9840499bc5813fe186a88d56d9561122c0586a891b19f88bc0c4e0192c8741a8837e10e19540440ff96e267a08316a2d2c3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks