General

  • Target

    0550a2981201529a4bac85007af3c421a306510e32afe55776aa1bb212f7f9f1

  • Size

    216KB

  • Sample

    220212-m7rl2sbef9

  • MD5

    0e62bc7335757cdcd3ccaa2e6e1cbd3d

  • SHA1

    13a67e46a2824ae6166a7d935c84c43687afe950

  • SHA256

    0550a2981201529a4bac85007af3c421a306510e32afe55776aa1bb212f7f9f1

  • SHA512

    2e27c8aaebbad7f1770141f07abc0306f46fe7ab1974fd3c07a90def2a0bb80f366b7c78aa5054558671a97b318427608ccadde9d06348d5099ef3d958700380

Malware Config

Targets

    • Target

      0550a2981201529a4bac85007af3c421a306510e32afe55776aa1bb212f7f9f1

    • Size

      216KB

    • MD5

      0e62bc7335757cdcd3ccaa2e6e1cbd3d

    • SHA1

      13a67e46a2824ae6166a7d935c84c43687afe950

    • SHA256

      0550a2981201529a4bac85007af3c421a306510e32afe55776aa1bb212f7f9f1

    • SHA512

      2e27c8aaebbad7f1770141f07abc0306f46fe7ab1974fd3c07a90def2a0bb80f366b7c78aa5054558671a97b318427608ccadde9d06348d5099ef3d958700380

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks