General

  • Target

    06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba

  • Size

    176KB

  • Sample

    220212-mkna4sbca6

  • MD5

    ecc41c4b69f563988d3a778598708f5b

  • SHA1

    72278ca602fc8e2843d39ed6339e1c7b231acfc5

  • SHA256

    06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba

  • SHA512

    1a09b67e415ee2583bc439ed21c634bc68787843609f863eb56aa4eee4090cb425d9693bbfce4d7afed824e1cb47f1f5f24399268c2d740d4ccf55aa156b1924

Malware Config

Targets

    • Target

      06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba

    • Size

      176KB

    • MD5

      ecc41c4b69f563988d3a778598708f5b

    • SHA1

      72278ca602fc8e2843d39ed6339e1c7b231acfc5

    • SHA256

      06e8eff4bb98c420d6de1ccfb7bad8041613833e47386e9cad242cc854253dba

    • SHA512

      1a09b67e415ee2583bc439ed21c634bc68787843609f863eb56aa4eee4090cb425d9693bbfce4d7afed824e1cb47f1f5f24399268c2d740d4ccf55aa156b1924

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks