General

  • Target

    0666d2f9b6173234a5829aeb84edc98141d17dacec7aaa79ceea69acbb5972f7

  • Size

    192KB

  • Sample

    220212-mrg3nsbcg6

  • MD5

    5f5bce3bd17241c0e46c5a2cbcf7d9d8

  • SHA1

    69d614d35a68a012d18d08ed5f5892f95f3ee8fe

  • SHA256

    0666d2f9b6173234a5829aeb84edc98141d17dacec7aaa79ceea69acbb5972f7

  • SHA512

    8eac6ff1c55ff09240b651c100ec47129dfeaf61ba4d5a8d97eec21287881998d9295ee21388325e6618faa0e48caff0969395881288fef0e98ab7cef479d6f4

Malware Config

Targets

    • Target

      0666d2f9b6173234a5829aeb84edc98141d17dacec7aaa79ceea69acbb5972f7

    • Size

      192KB

    • MD5

      5f5bce3bd17241c0e46c5a2cbcf7d9d8

    • SHA1

      69d614d35a68a012d18d08ed5f5892f95f3ee8fe

    • SHA256

      0666d2f9b6173234a5829aeb84edc98141d17dacec7aaa79ceea69acbb5972f7

    • SHA512

      8eac6ff1c55ff09240b651c100ec47129dfeaf61ba4d5a8d97eec21287881998d9295ee21388325e6618faa0e48caff0969395881288fef0e98ab7cef479d6f4

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks