General

  • Target

    06a99a4f9160c9f44ba822d631600e75d91d708d679af0eef5d5129162e410da

  • Size

    191KB

  • Sample

    220212-mpc1yabce7

  • MD5

    644c6932bdf8bf7dd2771dbbd3b4b73b

  • SHA1

    f1a5389c7dc61cd071c16be755023af5b2fb1a10

  • SHA256

    06a99a4f9160c9f44ba822d631600e75d91d708d679af0eef5d5129162e410da

  • SHA512

    89d8647cbdb0c305326d0823ca3f895217d07c0abedd0c89b77ce719cebd090b73e9e39069b1cdaa14ee774f352ec9c312bb3bfd5bf7bcb6faf42e4140c6600a

Malware Config

Targets

    • Target

      06a99a4f9160c9f44ba822d631600e75d91d708d679af0eef5d5129162e410da

    • Size

      191KB

    • MD5

      644c6932bdf8bf7dd2771dbbd3b4b73b

    • SHA1

      f1a5389c7dc61cd071c16be755023af5b2fb1a10

    • SHA256

      06a99a4f9160c9f44ba822d631600e75d91d708d679af0eef5d5129162e410da

    • SHA512

      89d8647cbdb0c305326d0823ca3f895217d07c0abedd0c89b77ce719cebd090b73e9e39069b1cdaa14ee774f352ec9c312bb3bfd5bf7bcb6faf42e4140c6600a

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks