General

  • Target

    06d62cf3ec91680f076ce35ed4743c32fc82425fd3a95f9baeb560cb2deea3cc

  • Size

    191KB

  • Sample

    220212-mljz3sbcb6

  • MD5

    732fcc90cea28191be836ef369fc2bea

  • SHA1

    ab577a952486490e53cc233b9d026f98a88e12c8

  • SHA256

    06d62cf3ec91680f076ce35ed4743c32fc82425fd3a95f9baeb560cb2deea3cc

  • SHA512

    1a9025e15e7078a383fa43c1179a13a9439e8ec4cee732e74d8f902885cb8dbe77466630c9825a06daca3c70c07ef41d7c67abc9d47859c00833ca3241b17ad3

Malware Config

Targets

    • Target

      06d62cf3ec91680f076ce35ed4743c32fc82425fd3a95f9baeb560cb2deea3cc

    • Size

      191KB

    • MD5

      732fcc90cea28191be836ef369fc2bea

    • SHA1

      ab577a952486490e53cc233b9d026f98a88e12c8

    • SHA256

      06d62cf3ec91680f076ce35ed4743c32fc82425fd3a95f9baeb560cb2deea3cc

    • SHA512

      1a9025e15e7078a383fa43c1179a13a9439e8ec4cee732e74d8f902885cb8dbe77466630c9825a06daca3c70c07ef41d7c67abc9d47859c00833ca3241b17ad3

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks