General

  • Target

    054d013bc055237bf90eeccc7cbfe820fe50adff4e69cf33a56608da535e38fb

  • Size

    216KB

  • Sample

    220212-m73z3sbeg3

  • MD5

    a20f53b09c915a5ff0cddd8d20602707

  • SHA1

    fba7a26aa46121b10c9b5e348b32e0be521aa19b

  • SHA256

    054d013bc055237bf90eeccc7cbfe820fe50adff4e69cf33a56608da535e38fb

  • SHA512

    814806ef81b9a6356fd2dd3f28979e6df0981a6e2c23a57c14c7767ed0235002024cd32136c0b6111c9122abcea4d693a20d08611e648a72a7aaa147ed2df0ee

Malware Config

Targets

    • Target

      054d013bc055237bf90eeccc7cbfe820fe50adff4e69cf33a56608da535e38fb

    • Size

      216KB

    • MD5

      a20f53b09c915a5ff0cddd8d20602707

    • SHA1

      fba7a26aa46121b10c9b5e348b32e0be521aa19b

    • SHA256

      054d013bc055237bf90eeccc7cbfe820fe50adff4e69cf33a56608da535e38fb

    • SHA512

      814806ef81b9a6356fd2dd3f28979e6df0981a6e2c23a57c14c7767ed0235002024cd32136c0b6111c9122abcea4d693a20d08611e648a72a7aaa147ed2df0ee

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks