General

  • Target

    06582dacdb7d9d2c4b5ec93772b5086d438ef1fd4a764fafbc33186667842f55

  • Size

    191KB

  • Sample

    220212-mrtfpsdabl

  • MD5

    f58f39bae3dbacb62798a7a5a41a973a

  • SHA1

    4ad676bba6e91064a27719dc681cdd0dba66cab9

  • SHA256

    06582dacdb7d9d2c4b5ec93772b5086d438ef1fd4a764fafbc33186667842f55

  • SHA512

    0bdce152f9d6ba3bcdaa1c07558dee727ac99a76afe0f50b92269ca51853a43abd809aec7c88a0294a2d13dddf5ec23d1ea39688c8fd8d69cd13d188559526fb

Malware Config

Targets

    • Target

      06582dacdb7d9d2c4b5ec93772b5086d438ef1fd4a764fafbc33186667842f55

    • Size

      191KB

    • MD5

      f58f39bae3dbacb62798a7a5a41a973a

    • SHA1

      4ad676bba6e91064a27719dc681cdd0dba66cab9

    • SHA256

      06582dacdb7d9d2c4b5ec93772b5086d438ef1fd4a764fafbc33186667842f55

    • SHA512

      0bdce152f9d6ba3bcdaa1c07558dee727ac99a76afe0f50b92269ca51853a43abd809aec7c88a0294a2d13dddf5ec23d1ea39688c8fd8d69cd13d188559526fb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks