General

  • Target

    023d6b7ab148a0723e13eb64195224a451a778c414fd2889c6e08eb992e8a351

  • Size

    35KB

  • Sample

    220212-pddt7scbb8

  • MD5

    558f4831cd438eb815b7aff1f142cdd6

  • SHA1

    3eb87da4ddd1f0d39c24e55084afdca1eca39117

  • SHA256

    023d6b7ab148a0723e13eb64195224a451a778c414fd2889c6e08eb992e8a351

  • SHA512

    2f0a14590ed0eb243aca2bc8cab525eacc91633cb1e1ff60b4b74701ec38c027c8c8db64026013ff1fa4f7fae29195b8eeb9376048e7db94bccc2db7fe8062a4

Malware Config

Targets

    • Target

      023d6b7ab148a0723e13eb64195224a451a778c414fd2889c6e08eb992e8a351

    • Size

      35KB

    • MD5

      558f4831cd438eb815b7aff1f142cdd6

    • SHA1

      3eb87da4ddd1f0d39c24e55084afdca1eca39117

    • SHA256

      023d6b7ab148a0723e13eb64195224a451a778c414fd2889c6e08eb992e8a351

    • SHA512

      2f0a14590ed0eb243aca2bc8cab525eacc91633cb1e1ff60b4b74701ec38c027c8c8db64026013ff1fa4f7fae29195b8eeb9376048e7db94bccc2db7fe8062a4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks