General

  • Target

    06acfd5720df2abb86a78c5f7743f37c3abb10d6cf4aa960e6c0e3a7d6c2c371

  • Size

    216KB

  • Sample

    220212-mpawksbce6

  • MD5

    acef801201018b0dfa3eafc97011833a

  • SHA1

    a4a0f7a42a1d751e194a5186deaa91e6e422dfcf

  • SHA256

    06acfd5720df2abb86a78c5f7743f37c3abb10d6cf4aa960e6c0e3a7d6c2c371

  • SHA512

    18c52aec1dcea578613eaa90ced8bc4cfd63317ed124a09aff8cd5d8f009a71621346416a8082c8e4b40f3fdf2ae1f67b62cbf1b2e43a0c8b31d340dd6e9b30c

Malware Config

Targets

    • Target

      06acfd5720df2abb86a78c5f7743f37c3abb10d6cf4aa960e6c0e3a7d6c2c371

    • Size

      216KB

    • MD5

      acef801201018b0dfa3eafc97011833a

    • SHA1

      a4a0f7a42a1d751e194a5186deaa91e6e422dfcf

    • SHA256

      06acfd5720df2abb86a78c5f7743f37c3abb10d6cf4aa960e6c0e3a7d6c2c371

    • SHA512

      18c52aec1dcea578613eaa90ced8bc4cfd63317ed124a09aff8cd5d8f009a71621346416a8082c8e4b40f3fdf2ae1f67b62cbf1b2e43a0c8b31d340dd6e9b30c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks