General

  • Target

    07a55888572163ca5332c4813a5ee0a1fdc57ac3e003798aff3c3aed1eb6124b

  • Size

    150KB

  • Sample

    220212-mb6q4abag9

  • MD5

    dc2c99c636960ebb884d75ac37c5028c

  • SHA1

    e60348503792d9c4e5e4474f88d50f81b353650d

  • SHA256

    07a55888572163ca5332c4813a5ee0a1fdc57ac3e003798aff3c3aed1eb6124b

  • SHA512

    f63ec438eb215e057540f37c1e92dd607ad8482d2b436ba2b4e5268af51af6fafe88d2a028482a3c10ab7a808952d905048881b965c0e34194cbdd9a77fd98e6

Malware Config

Targets

    • Target

      07a55888572163ca5332c4813a5ee0a1fdc57ac3e003798aff3c3aed1eb6124b

    • Size

      150KB

    • MD5

      dc2c99c636960ebb884d75ac37c5028c

    • SHA1

      e60348503792d9c4e5e4474f88d50f81b353650d

    • SHA256

      07a55888572163ca5332c4813a5ee0a1fdc57ac3e003798aff3c3aed1eb6124b

    • SHA512

      f63ec438eb215e057540f37c1e92dd607ad8482d2b436ba2b4e5268af51af6fafe88d2a028482a3c10ab7a808952d905048881b965c0e34194cbdd9a77fd98e6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks