General

  • Target

    04456bf047a49a779a2123016232f3b140780cd5607a2f427bca39d57e8fcb23

  • Size

    60KB

  • Sample

    220212-nltpysddgj

  • MD5

    acbcbdf083670f1d6be2800984f586dd

  • SHA1

    6182e2a93470fa17e12a842733a8d8bdbd8fecc9

  • SHA256

    04456bf047a49a779a2123016232f3b140780cd5607a2f427bca39d57e8fcb23

  • SHA512

    c557d8f838d792f3c971878d6e98c5bad3403fbadd5cc814b95c2a77581149946a01965d620d9ca126fbc3a622b8b49f05473f338d1a18b9f566c678f71a517b

Malware Config

Targets

    • Target

      04456bf047a49a779a2123016232f3b140780cd5607a2f427bca39d57e8fcb23

    • Size

      60KB

    • MD5

      acbcbdf083670f1d6be2800984f586dd

    • SHA1

      6182e2a93470fa17e12a842733a8d8bdbd8fecc9

    • SHA256

      04456bf047a49a779a2123016232f3b140780cd5607a2f427bca39d57e8fcb23

    • SHA512

      c557d8f838d792f3c971878d6e98c5bad3403fbadd5cc814b95c2a77581149946a01965d620d9ca126fbc3a622b8b49f05473f338d1a18b9f566c678f71a517b

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks