General

  • Target

    064c2af6d23451ab6a3bf8978b322e2df8e078e134b5ee09ca7756be2ce6d673

  • Size

    100KB

  • Sample

    220212-mr7nbsbch2

  • MD5

    6e1c74abdfa77aecab378a70121c1aea

  • SHA1

    6b9a89ad232ecc3a00d289541713243b0318881f

  • SHA256

    064c2af6d23451ab6a3bf8978b322e2df8e078e134b5ee09ca7756be2ce6d673

  • SHA512

    104d9718ac705d6bf22358faefab6a977c754b90dfba7f5bf70862803881bd8074e085b8c64ae0d59cc862e790bf5c440c8b94d2c31b45e7476aab5aecfc45e4

Malware Config

Targets

    • Target

      064c2af6d23451ab6a3bf8978b322e2df8e078e134b5ee09ca7756be2ce6d673

    • Size

      100KB

    • MD5

      6e1c74abdfa77aecab378a70121c1aea

    • SHA1

      6b9a89ad232ecc3a00d289541713243b0318881f

    • SHA256

      064c2af6d23451ab6a3bf8978b322e2df8e078e134b5ee09ca7756be2ce6d673

    • SHA512

      104d9718ac705d6bf22358faefab6a977c754b90dfba7f5bf70862803881bd8074e085b8c64ae0d59cc862e790bf5c440c8b94d2c31b45e7476aab5aecfc45e4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks