General

  • Target

    0496db5f1104b3c2bc4c4b34dd0004608b814642cde7eac4420cec949da0fb8b

  • Size

    60KB

  • Sample

    220212-ngkaqaddbk

  • MD5

    b2e9cb2358ab3f79b1723686434daa94

  • SHA1

    e30169dce809d789535ee806fa11c7d3fbb26cea

  • SHA256

    0496db5f1104b3c2bc4c4b34dd0004608b814642cde7eac4420cec949da0fb8b

  • SHA512

    b5cac4971db4f901215af5f6380376b96d46244d1a210f6c26ee564c3a4fab968931396a2b842fb9d9c176248b3f29c5bf4c1733fd8d3c173a453c383ed3043f

Malware Config

Targets

    • Target

      0496db5f1104b3c2bc4c4b34dd0004608b814642cde7eac4420cec949da0fb8b

    • Size

      60KB

    • MD5

      b2e9cb2358ab3f79b1723686434daa94

    • SHA1

      e30169dce809d789535ee806fa11c7d3fbb26cea

    • SHA256

      0496db5f1104b3c2bc4c4b34dd0004608b814642cde7eac4420cec949da0fb8b

    • SHA512

      b5cac4971db4f901215af5f6380376b96d46244d1a210f6c26ee564c3a4fab968931396a2b842fb9d9c176248b3f29c5bf4c1733fd8d3c173a453c383ed3043f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks