General

  • Target

    047f1a7565e80db7fc18a6cdc4a9167d6ccb412f61f6623e009bd5d850f342d1

  • Size

    58KB

  • Sample

    220212-nhqh5addck

  • MD5

    aef6f5b4546b416b2c21261fbf221e83

  • SHA1

    d0c1ec3495fc08406886187f6505b8042a00c98f

  • SHA256

    047f1a7565e80db7fc18a6cdc4a9167d6ccb412f61f6623e009bd5d850f342d1

  • SHA512

    333040bac4fd16828775a3dc351e4d81422ed81354ed23feb93ed6b3500d35a872e27c7a3ec98f3afb5042c584ad97cb953169a90ce4083e52bd72140d73ab1e

Malware Config

Targets

    • Target

      047f1a7565e80db7fc18a6cdc4a9167d6ccb412f61f6623e009bd5d850f342d1

    • Size

      58KB

    • MD5

      aef6f5b4546b416b2c21261fbf221e83

    • SHA1

      d0c1ec3495fc08406886187f6505b8042a00c98f

    • SHA256

      047f1a7565e80db7fc18a6cdc4a9167d6ccb412f61f6623e009bd5d850f342d1

    • SHA512

      333040bac4fd16828775a3dc351e4d81422ed81354ed23feb93ed6b3500d35a872e27c7a3ec98f3afb5042c584ad97cb953169a90ce4083e52bd72140d73ab1e

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks