General

  • Target

    06eaff19e4cf53f65908be6e2fb7cd79f04ffb471a7d45d6c7686b77414363ba

  • Size

    200KB

  • Sample

    220212-mkk6rabca5

  • MD5

    cc730862f06bc3554660bcff94c78047

  • SHA1

    bc857b68028dbe836b9452f5a0de36de2bab382f

  • SHA256

    06eaff19e4cf53f65908be6e2fb7cd79f04ffb471a7d45d6c7686b77414363ba

  • SHA512

    f874b9afb9b483fe013aff7636d1234a928eed6c5b072fd712977c85107ced809fef1ed38fdd567872239d81d27584710a94e270b1c639e19f3e97528f3839c6

Malware Config

Targets

    • Target

      06eaff19e4cf53f65908be6e2fb7cd79f04ffb471a7d45d6c7686b77414363ba

    • Size

      200KB

    • MD5

      cc730862f06bc3554660bcff94c78047

    • SHA1

      bc857b68028dbe836b9452f5a0de36de2bab382f

    • SHA256

      06eaff19e4cf53f65908be6e2fb7cd79f04ffb471a7d45d6c7686b77414363ba

    • SHA512

      f874b9afb9b483fe013aff7636d1234a928eed6c5b072fd712977c85107ced809fef1ed38fdd567872239d81d27584710a94e270b1c639e19f3e97528f3839c6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks