General

  • Target

    0643f3bf97ea3496de7a9aa618d702a321501e9d82b5df2bb6f9a92d03ffdca4

  • Size

    216KB

  • Sample

    220212-msry9sbch8

  • MD5

    67b816ea23e04f014d7f4b6afb0c9107

  • SHA1

    531feb9b55592d797cd59fd19810195792c52c2f

  • SHA256

    0643f3bf97ea3496de7a9aa618d702a321501e9d82b5df2bb6f9a92d03ffdca4

  • SHA512

    e41db54fee4b1c709dcb24192af22fc6f1dceed7ea3509372063c635e21516783df31d9540ca9d410d6f7d7700b245a226f0cfc8e75f30af6e5c7a4e6fb498f0

Malware Config

Targets

    • Target

      0643f3bf97ea3496de7a9aa618d702a321501e9d82b5df2bb6f9a92d03ffdca4

    • Size

      216KB

    • MD5

      67b816ea23e04f014d7f4b6afb0c9107

    • SHA1

      531feb9b55592d797cd59fd19810195792c52c2f

    • SHA256

      0643f3bf97ea3496de7a9aa618d702a321501e9d82b5df2bb6f9a92d03ffdca4

    • SHA512

      e41db54fee4b1c709dcb24192af22fc6f1dceed7ea3509372063c635e21516783df31d9540ca9d410d6f7d7700b245a226f0cfc8e75f30af6e5c7a4e6fb498f0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks