General

  • Target

    0795e2efe5b62bb5f5b2b68fa50067f4bda05cbb816b386546057ef5bd18f710

  • Size

    92KB

  • Sample

    220212-mcwbrabba2

  • MD5

    65059c7ee5c15d792bbe81fb7dab2092

  • SHA1

    214b3255435795adf4a2e22b1d84beb13a365267

  • SHA256

    0795e2efe5b62bb5f5b2b68fa50067f4bda05cbb816b386546057ef5bd18f710

  • SHA512

    39234fc3c5f6ecc891084a32d3f0a70ba51804d1d927bd1bbd0ebc9375678d57d74a5fad22bd8688577ef39c48f43e977168cf8ffcaacaff6e9b691f9de5173c

Malware Config

Targets

    • Target

      0795e2efe5b62bb5f5b2b68fa50067f4bda05cbb816b386546057ef5bd18f710

    • Size

      92KB

    • MD5

      65059c7ee5c15d792bbe81fb7dab2092

    • SHA1

      214b3255435795adf4a2e22b1d84beb13a365267

    • SHA256

      0795e2efe5b62bb5f5b2b68fa50067f4bda05cbb816b386546057ef5bd18f710

    • SHA512

      39234fc3c5f6ecc891084a32d3f0a70ba51804d1d927bd1bbd0ebc9375678d57d74a5fad22bd8688577ef39c48f43e977168cf8ffcaacaff6e9b691f9de5173c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks