General

  • Target

    0765c14e7ebed003763f7d165ae8ee0ead3eb4b27d65a3aa12d4653eb651ed09

  • Size

    192KB

  • Sample

    220212-meyjwscgdp

  • MD5

    af2bc65ce82c399ce5217e9a4b919f03

  • SHA1

    b9b34bad41c293df1fe2bf2371d822cd6dba5adc

  • SHA256

    0765c14e7ebed003763f7d165ae8ee0ead3eb4b27d65a3aa12d4653eb651ed09

  • SHA512

    04be93536f78bc59b8b5d6443b12c8753ae369380ddf223e0ea88fba5802e2a3cffe21875c4176749f1b762e652e070ea6a623a7084fc2bbe213e51fc51a051a

Malware Config

Targets

    • Target

      0765c14e7ebed003763f7d165ae8ee0ead3eb4b27d65a3aa12d4653eb651ed09

    • Size

      192KB

    • MD5

      af2bc65ce82c399ce5217e9a4b919f03

    • SHA1

      b9b34bad41c293df1fe2bf2371d822cd6dba5adc

    • SHA256

      0765c14e7ebed003763f7d165ae8ee0ead3eb4b27d65a3aa12d4653eb651ed09

    • SHA512

      04be93536f78bc59b8b5d6443b12c8753ae369380ddf223e0ea88fba5802e2a3cffe21875c4176749f1b762e652e070ea6a623a7084fc2bbe213e51fc51a051a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks