General

  • Target

    041bd36d8ab576d3d92a49eba9c7698bd2b22140876a575df82ec349abcb1222

  • Size

    35KB

  • Sample

    220212-nn633adebj

  • MD5

    aad2b1a60206bb90a7262fff47b30106

  • SHA1

    638947ec305652d71c194ad073a0895bfff7fc88

  • SHA256

    041bd36d8ab576d3d92a49eba9c7698bd2b22140876a575df82ec349abcb1222

  • SHA512

    29425bad4075fdf27a7f253430d4aa9063e03e696451ae1827db339be7507a6450c4b3d1bc5ccda8e876161b589fbd52628cb093ce32dcedcf0e95a092798abb

Malware Config

Targets

    • Target

      041bd36d8ab576d3d92a49eba9c7698bd2b22140876a575df82ec349abcb1222

    • Size

      35KB

    • MD5

      aad2b1a60206bb90a7262fff47b30106

    • SHA1

      638947ec305652d71c194ad073a0895bfff7fc88

    • SHA256

      041bd36d8ab576d3d92a49eba9c7698bd2b22140876a575df82ec349abcb1222

    • SHA512

      29425bad4075fdf27a7f253430d4aa9063e03e696451ae1827db339be7507a6450c4b3d1bc5ccda8e876161b589fbd52628cb093ce32dcedcf0e95a092798abb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks