General

  • Target

    03dc0f94b5f7e9fe1eb83c1b090eeb4b39e5634d8ebfb2384e52d52a0624849d

  • Size

    35KB

  • Sample

    220212-nr4r4sdeel

  • MD5

    d936f7e2d96c4491935ef755b54e291c

  • SHA1

    3571d98d9186aee523125dd6026bac3e3b4bc24b

  • SHA256

    03dc0f94b5f7e9fe1eb83c1b090eeb4b39e5634d8ebfb2384e52d52a0624849d

  • SHA512

    a17a65f2ae9e3bd64bdcccaad2bd70280a20d4710db4540904a85ac3f010c0fdca3591bea0363bd434c950c926bf064b0e026eabae4e81837c937864c0457d02

Malware Config

Targets

    • Target

      03dc0f94b5f7e9fe1eb83c1b090eeb4b39e5634d8ebfb2384e52d52a0624849d

    • Size

      35KB

    • MD5

      d936f7e2d96c4491935ef755b54e291c

    • SHA1

      3571d98d9186aee523125dd6026bac3e3b4bc24b

    • SHA256

      03dc0f94b5f7e9fe1eb83c1b090eeb4b39e5634d8ebfb2384e52d52a0624849d

    • SHA512

      a17a65f2ae9e3bd64bdcccaad2bd70280a20d4710db4540904a85ac3f010c0fdca3591bea0363bd434c950c926bf064b0e026eabae4e81837c937864c0457d02

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks