General

  • Target

    0657f371b795e3244192d4abdc906ea4e665e3714d4ac3b56a1e629c7217581f

  • Size

    92KB

  • Sample

    220212-mrwk3abcg8

  • MD5

    9caff9887ab59d9b2f88012b7c5078cd

  • SHA1

    d3e9f884c41bd554aec06e5ebc163e3c092a9a70

  • SHA256

    0657f371b795e3244192d4abdc906ea4e665e3714d4ac3b56a1e629c7217581f

  • SHA512

    8ed57fb7866abb4a19037c32dd355b725a5b0263de77b0daae3c82e19618ddbd7c301423c2182468637ba75c145628e6a6afb7389d6887686495b9dac275baa1

Malware Config

Targets

    • Target

      0657f371b795e3244192d4abdc906ea4e665e3714d4ac3b56a1e629c7217581f

    • Size

      92KB

    • MD5

      9caff9887ab59d9b2f88012b7c5078cd

    • SHA1

      d3e9f884c41bd554aec06e5ebc163e3c092a9a70

    • SHA256

      0657f371b795e3244192d4abdc906ea4e665e3714d4ac3b56a1e629c7217581f

    • SHA512

      8ed57fb7866abb4a19037c32dd355b725a5b0263de77b0daae3c82e19618ddbd7c301423c2182468637ba75c145628e6a6afb7389d6887686495b9dac275baa1

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks