General

  • Target

    066908dfdb3ae68c732620083f81588160983350b41180675335e8f9b26b857b

  • Size

    191KB

  • Sample

    220212-mrcsysbcg4

  • MD5

    785dea024dfabaf66dcb0b67df2311ef

  • SHA1

    8dc084fd3883c1455d186d3af42cff9f9eec3f91

  • SHA256

    066908dfdb3ae68c732620083f81588160983350b41180675335e8f9b26b857b

  • SHA512

    3c6fdad7fe4e63e831de7b0bf2699afc5e490a402597666885911da21bae7cb79a47f2fdda00ea1b529fc84341337f5a4132f6acf40f422f396597747349e549

Malware Config

Targets

    • Target

      066908dfdb3ae68c732620083f81588160983350b41180675335e8f9b26b857b

    • Size

      191KB

    • MD5

      785dea024dfabaf66dcb0b67df2311ef

    • SHA1

      8dc084fd3883c1455d186d3af42cff9f9eec3f91

    • SHA256

      066908dfdb3ae68c732620083f81588160983350b41180675335e8f9b26b857b

    • SHA512

      3c6fdad7fe4e63e831de7b0bf2699afc5e490a402597666885911da21bae7cb79a47f2fdda00ea1b529fc84341337f5a4132f6acf40f422f396597747349e549

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks