General

  • Target

    059daffab9af1c2fac5330a208c3dc5f479e79b05a373a3ea8881845ce87add5

  • Size

    79KB

  • Sample

    220212-m3j2eadbcp

  • MD5

    1003eb4605b06afdbdb0841699efa78b

  • SHA1

    2f4a138d746276eb3af5c1624de3ab5a3cc279a1

  • SHA256

    059daffab9af1c2fac5330a208c3dc5f479e79b05a373a3ea8881845ce87add5

  • SHA512

    6c2d247832070ffaa03aaa9cbbc5d4683cc67ff0186883290a154c1a77c66615bbf414dc90fcad8dffa8356121f1aa57c3c89db556a4328f672f03c007422cdd

Malware Config

Targets

    • Target

      059daffab9af1c2fac5330a208c3dc5f479e79b05a373a3ea8881845ce87add5

    • Size

      79KB

    • MD5

      1003eb4605b06afdbdb0841699efa78b

    • SHA1

      2f4a138d746276eb3af5c1624de3ab5a3cc279a1

    • SHA256

      059daffab9af1c2fac5330a208c3dc5f479e79b05a373a3ea8881845ce87add5

    • SHA512

      6c2d247832070ffaa03aaa9cbbc5d4683cc67ff0186883290a154c1a77c66615bbf414dc90fcad8dffa8356121f1aa57c3c89db556a4328f672f03c007422cdd

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks