General

  • Target

    0643f2cd9e5e8af4df9be896e93f758f5f2cf92b9aba29aa22d8a36afb56bf56

  • Size

    92KB

  • Sample

    220212-mst4mabch9

  • MD5

    e1b788ede6adde51696a4bb3237b185f

  • SHA1

    0e95e623da58696d8e1e27f8acaf8ab8c5537810

  • SHA256

    0643f2cd9e5e8af4df9be896e93f758f5f2cf92b9aba29aa22d8a36afb56bf56

  • SHA512

    fa462a83222e19e10312254522e0c814966695dbad68d40bc6559f2ab608c2e496f624d7472a0acf4cf5c39d56a5388c99d8935d829358e2e55c418262187ed8

Malware Config

Targets

    • Target

      0643f2cd9e5e8af4df9be896e93f758f5f2cf92b9aba29aa22d8a36afb56bf56

    • Size

      92KB

    • MD5

      e1b788ede6adde51696a4bb3237b185f

    • SHA1

      0e95e623da58696d8e1e27f8acaf8ab8c5537810

    • SHA256

      0643f2cd9e5e8af4df9be896e93f758f5f2cf92b9aba29aa22d8a36afb56bf56

    • SHA512

      fa462a83222e19e10312254522e0c814966695dbad68d40bc6559f2ab608c2e496f624d7472a0acf4cf5c39d56a5388c99d8935d829358e2e55c418262187ed8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks