General

  • Target

    0648b67b0b609aa59833ecb7782c6deea369ca9308b187ec10dcee090a082682

  • Size

    152KB

  • Sample

    220212-msfk8sbch5

  • MD5

    1fa46620429d954ddb80dbe4cd6c40c6

  • SHA1

    26eb440812d5cdc59b28bd1c3650fb855d79cbca

  • SHA256

    0648b67b0b609aa59833ecb7782c6deea369ca9308b187ec10dcee090a082682

  • SHA512

    dad29c160d0643a31c21d008e59899fc56e1ce084fe267a049d945e3330432c800d4668a8349ef11253175183f8b8fed8c4e09596ff75f5d6ebc6e8695d51134

Malware Config

Targets

    • Target

      0648b67b0b609aa59833ecb7782c6deea369ca9308b187ec10dcee090a082682

    • Size

      152KB

    • MD5

      1fa46620429d954ddb80dbe4cd6c40c6

    • SHA1

      26eb440812d5cdc59b28bd1c3650fb855d79cbca

    • SHA256

      0648b67b0b609aa59833ecb7782c6deea369ca9308b187ec10dcee090a082682

    • SHA512

      dad29c160d0643a31c21d008e59899fc56e1ce084fe267a049d945e3330432c800d4668a8349ef11253175183f8b8fed8c4e09596ff75f5d6ebc6e8695d51134

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks