General

  • Target

    06fc86aa934881c5c64050ae95b47bee6067ead78c75ac7387c365876aa343b9

  • Size

    216KB

  • Sample

    220212-mjyepabbh5

  • MD5

    29723179a102ce73bb6886208871de3c

  • SHA1

    5516d6eb3329330b7c0751561ef19e6ba9af6ddd

  • SHA256

    06fc86aa934881c5c64050ae95b47bee6067ead78c75ac7387c365876aa343b9

  • SHA512

    56f2ff2f1bb79abebf83262d83a01ebc5192f922de2b5cf569fc918e9af9db7618250ce6eb3a1386e1cb2eeeecf91fe75383d012688dab28e1b22fb6603e5edc

Malware Config

Targets

    • Target

      06fc86aa934881c5c64050ae95b47bee6067ead78c75ac7387c365876aa343b9

    • Size

      216KB

    • MD5

      29723179a102ce73bb6886208871de3c

    • SHA1

      5516d6eb3329330b7c0751561ef19e6ba9af6ddd

    • SHA256

      06fc86aa934881c5c64050ae95b47bee6067ead78c75ac7387c365876aa343b9

    • SHA512

      56f2ff2f1bb79abebf83262d83a01ebc5192f922de2b5cf569fc918e9af9db7618250ce6eb3a1386e1cb2eeeecf91fe75383d012688dab28e1b22fb6603e5edc

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks