General

  • Target

    053cdd20c77fef01ff1d23b2eae685829caf8e1d2237980b4d994061f2e49486

  • Size

    80KB

  • Sample

    220212-m8vp4adcbj

  • MD5

    4f0bcb277174b0aeb655e4fe697c3422

  • SHA1

    a4b93fa52156df3179ffbe3a29e50c32ca581cf0

  • SHA256

    053cdd20c77fef01ff1d23b2eae685829caf8e1d2237980b4d994061f2e49486

  • SHA512

    91ee106fd2925a97493612268a9a4d5bbd48bb7091b89c26d6060a8bc1a7ed56c05f7bea886f29cab5e484e40891538dacefa8f9317cbe06d9e8a71e9814e89c

Malware Config

Targets

    • Target

      053cdd20c77fef01ff1d23b2eae685829caf8e1d2237980b4d994061f2e49486

    • Size

      80KB

    • MD5

      4f0bcb277174b0aeb655e4fe697c3422

    • SHA1

      a4b93fa52156df3179ffbe3a29e50c32ca581cf0

    • SHA256

      053cdd20c77fef01ff1d23b2eae685829caf8e1d2237980b4d994061f2e49486

    • SHA512

      91ee106fd2925a97493612268a9a4d5bbd48bb7091b89c26d6060a8bc1a7ed56c05f7bea886f29cab5e484e40891538dacefa8f9317cbe06d9e8a71e9814e89c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks