General

  • Target

    06c8a24f3f3908981cde248e0fc5ffefa174cc577df9d8506c42a73e4ac00346

  • Size

    80KB

  • Sample

    220212-mma4kabcc5

  • MD5

    5d79ebc6b959439239f724aa30a5cb88

  • SHA1

    6c241253bad7db40eb18af6c4ca79f6fd1e41f66

  • SHA256

    06c8a24f3f3908981cde248e0fc5ffefa174cc577df9d8506c42a73e4ac00346

  • SHA512

    6be72e980e1791666ddf8dba44150e900a4f2a8b7502fba795f8d9168b479d49665a961343c128ccabdfe6558f3a9c6d1016ef1f6d5b2b6ed194b4a38a3e1daa

Malware Config

Targets

    • Target

      06c8a24f3f3908981cde248e0fc5ffefa174cc577df9d8506c42a73e4ac00346

    • Size

      80KB

    • MD5

      5d79ebc6b959439239f724aa30a5cb88

    • SHA1

      6c241253bad7db40eb18af6c4ca79f6fd1e41f66

    • SHA256

      06c8a24f3f3908981cde248e0fc5ffefa174cc577df9d8506c42a73e4ac00346

    • SHA512

      6be72e980e1791666ddf8dba44150e900a4f2a8b7502fba795f8d9168b479d49665a961343c128ccabdfe6558f3a9c6d1016ef1f6d5b2b6ed194b4a38a3e1daa

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks