General

  • Target

    068d43175c6f6bc9f0b731e805f1a28abd244f3ce4aaab0f30f250aabfc3a325

  • Size

    80KB

  • Sample

    220212-mp763sbcf4

  • MD5

    80520674f4cc81233d8eeed6e48511c0

  • SHA1

    859bd2b0672a23311c444086896a64e8b6b93438

  • SHA256

    068d43175c6f6bc9f0b731e805f1a28abd244f3ce4aaab0f30f250aabfc3a325

  • SHA512

    ee995e5dc9443517fb1165be65b9c0fc54fa364c146ab0ddeedd1e29cba2362a18ff57810b30d045dd665ad35746032a4427fa26b4779cfe394d60d9974201fe

Malware Config

Targets

    • Target

      068d43175c6f6bc9f0b731e805f1a28abd244f3ce4aaab0f30f250aabfc3a325

    • Size

      80KB

    • MD5

      80520674f4cc81233d8eeed6e48511c0

    • SHA1

      859bd2b0672a23311c444086896a64e8b6b93438

    • SHA256

      068d43175c6f6bc9f0b731e805f1a28abd244f3ce4aaab0f30f250aabfc3a325

    • SHA512

      ee995e5dc9443517fb1165be65b9c0fc54fa364c146ab0ddeedd1e29cba2362a18ff57810b30d045dd665ad35746032a4427fa26b4779cfe394d60d9974201fe

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks