General

  • Target

    0547598a27c29994298994fadb0c8ecd6841b0a96c05cfdaa7e80c77fef18bb9

  • Size

    92KB

  • Sample

    220212-m77y2abeg5

  • MD5

    0d161427c84c99658d37cfbee02c221c

  • SHA1

    8aed0a2ab6643774ba68f9c6c229ec72b4c7a4a0

  • SHA256

    0547598a27c29994298994fadb0c8ecd6841b0a96c05cfdaa7e80c77fef18bb9

  • SHA512

    5a152c477826e7c5425377b9f0f46225589103fc24588736b0819cdad02b8f497321dc8fb33263e34b4935e4b75a5a52fb299e321b462e3011c02429b73668e1

Malware Config

Targets

    • Target

      0547598a27c29994298994fadb0c8ecd6841b0a96c05cfdaa7e80c77fef18bb9

    • Size

      92KB

    • MD5

      0d161427c84c99658d37cfbee02c221c

    • SHA1

      8aed0a2ab6643774ba68f9c6c229ec72b4c7a4a0

    • SHA256

      0547598a27c29994298994fadb0c8ecd6841b0a96c05cfdaa7e80c77fef18bb9

    • SHA512

      5a152c477826e7c5425377b9f0f46225589103fc24588736b0819cdad02b8f497321dc8fb33263e34b4935e4b75a5a52fb299e321b462e3011c02429b73668e1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks