General

  • Target

    06a00459856234d5a0d62331701c13e3ecabce618fa3e8fb7a9d5e3f0bdee7d3

  • Size

    216KB

  • Sample

    220212-mpppqsbce9

  • MD5

    a3ca021350034de47209827352310697

  • SHA1

    28647851ab6458e0cbad03053c481863006eada0

  • SHA256

    06a00459856234d5a0d62331701c13e3ecabce618fa3e8fb7a9d5e3f0bdee7d3

  • SHA512

    5a227c360d72ba1bcc5c88f111aeac2732292641a7e33bed885c5c8ce9f105e4a877378b1bab6b4ea1d295cfe4a290c817433065c37503d0daabaec24516efd9

Malware Config

Targets

    • Target

      06a00459856234d5a0d62331701c13e3ecabce618fa3e8fb7a9d5e3f0bdee7d3

    • Size

      216KB

    • MD5

      a3ca021350034de47209827352310697

    • SHA1

      28647851ab6458e0cbad03053c481863006eada0

    • SHA256

      06a00459856234d5a0d62331701c13e3ecabce618fa3e8fb7a9d5e3f0bdee7d3

    • SHA512

      5a227c360d72ba1bcc5c88f111aeac2732292641a7e33bed885c5c8ce9f105e4a877378b1bab6b4ea1d295cfe4a290c817433065c37503d0daabaec24516efd9

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks