General

  • Target

    057dca2bbf8baf262e9575959872191a524b865e0d985fbce95b583f4f629eb3

  • Size

    79KB

  • Sample

    220212-m4tl8sbec8

  • MD5

    be9cb7e9216eef4945ef7543cd22b42e

  • SHA1

    3b48ffc566784d090015324d3ec8a5419c73309c

  • SHA256

    057dca2bbf8baf262e9575959872191a524b865e0d985fbce95b583f4f629eb3

  • SHA512

    088923b538f130397705a097200526eede8c230a8c16be54006b68fcfa1f58b0f5f24a9e18f85e6e0ab266d7d934edacaa7279a2463ea011dd4973bc86d420a6

Malware Config

Targets

    • Target

      057dca2bbf8baf262e9575959872191a524b865e0d985fbce95b583f4f629eb3

    • Size

      79KB

    • MD5

      be9cb7e9216eef4945ef7543cd22b42e

    • SHA1

      3b48ffc566784d090015324d3ec8a5419c73309c

    • SHA256

      057dca2bbf8baf262e9575959872191a524b865e0d985fbce95b583f4f629eb3

    • SHA512

      088923b538f130397705a097200526eede8c230a8c16be54006b68fcfa1f58b0f5f24a9e18f85e6e0ab266d7d934edacaa7279a2463ea011dd4973bc86d420a6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks