General

  • Target

    03eded2666f0a7cf404f064886cd2b414cb4d5bca02f420402b59c9711ae2f2b

  • Size

    35KB

  • Sample

    220212-nq5ysabgg4

  • MD5

    c21dfb13c69b107269d36398c7caa2fe

  • SHA1

    0e3cf31f6401a88dafbfd66b1fa7824cab56f70a

  • SHA256

    03eded2666f0a7cf404f064886cd2b414cb4d5bca02f420402b59c9711ae2f2b

  • SHA512

    da0e77e6fc4710461789c4b9dcdd3b1021922fa3af1b0f86ee063180e01198aed404b7fb230020494563d9dbb23e9544f95501f0b0cd0ce123bf184b82164b9c

Malware Config

Targets

    • Target

      03eded2666f0a7cf404f064886cd2b414cb4d5bca02f420402b59c9711ae2f2b

    • Size

      35KB

    • MD5

      c21dfb13c69b107269d36398c7caa2fe

    • SHA1

      0e3cf31f6401a88dafbfd66b1fa7824cab56f70a

    • SHA256

      03eded2666f0a7cf404f064886cd2b414cb4d5bca02f420402b59c9711ae2f2b

    • SHA512

      da0e77e6fc4710461789c4b9dcdd3b1021922fa3af1b0f86ee063180e01198aed404b7fb230020494563d9dbb23e9544f95501f0b0cd0ce123bf184b82164b9c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks