General

  • Target

    07767bfae0abae567d8ce27593152e6c03ec8a0949f7c9dbbe931dbc74547321

  • Size

    192KB

  • Sample

    220212-mee3jsbbb7

  • MD5

    6cb4f2a18b9bc0a926b9b244ba442675

  • SHA1

    762e961cf42f462073119fc78191b1b4099b0c80

  • SHA256

    07767bfae0abae567d8ce27593152e6c03ec8a0949f7c9dbbe931dbc74547321

  • SHA512

    ee811655344a2ff6ffea297778e48ac2cb7e5534ee4d1777743aa96dce1100c32d8c1f813fa907664e1d32cd682ca8ee40cc6beb59fc713b83b5e4a4735529f5

Malware Config

Targets

    • Target

      07767bfae0abae567d8ce27593152e6c03ec8a0949f7c9dbbe931dbc74547321

    • Size

      192KB

    • MD5

      6cb4f2a18b9bc0a926b9b244ba442675

    • SHA1

      762e961cf42f462073119fc78191b1b4099b0c80

    • SHA256

      07767bfae0abae567d8ce27593152e6c03ec8a0949f7c9dbbe931dbc74547321

    • SHA512

      ee811655344a2ff6ffea297778e48ac2cb7e5534ee4d1777743aa96dce1100c32d8c1f813fa907664e1d32cd682ca8ee40cc6beb59fc713b83b5e4a4735529f5

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks