General

  • Target

    079b64868d9bd95684504c9213dcce052de9815d1cc751dfb285072f46c7df0c

  • Size

    36KB

  • Sample

    220212-mcrcsscgbj

  • MD5

    38de6fa0d2f030cd0ebc4b60145d6ae1

  • SHA1

    04afd032fb87a6458e3b7d56c7d21359bd690392

  • SHA256

    079b64868d9bd95684504c9213dcce052de9815d1cc751dfb285072f46c7df0c

  • SHA512

    2437ee224372d51cdf725bf07537d291aa7d63d459634df4fc4cd85004728b33426831b282b3f8478ef553ec6ef1fcd7a50c1f3aa534aca38dc56eb2d329761d

Malware Config

Targets

    • Target

      079b64868d9bd95684504c9213dcce052de9815d1cc751dfb285072f46c7df0c

    • Size

      36KB

    • MD5

      38de6fa0d2f030cd0ebc4b60145d6ae1

    • SHA1

      04afd032fb87a6458e3b7d56c7d21359bd690392

    • SHA256

      079b64868d9bd95684504c9213dcce052de9815d1cc751dfb285072f46c7df0c

    • SHA512

      2437ee224372d51cdf725bf07537d291aa7d63d459634df4fc4cd85004728b33426831b282b3f8478ef553ec6ef1fcd7a50c1f3aa534aca38dc56eb2d329761d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks