General

  • Target

    063e6fcb607c400d49edb12a44421e504ef93bead5677cc178ce978e9455078c

  • Size

    191KB

  • Sample

    220212-msy3ksdacm

  • MD5

    ec1f75e51b841a3d94197b1c2ff387b9

  • SHA1

    d958c3f8d96bdda66830535b73e7cee33d02afe3

  • SHA256

    063e6fcb607c400d49edb12a44421e504ef93bead5677cc178ce978e9455078c

  • SHA512

    a0ebfb772e6d18db25c2ecdd7552e5064c0282e716b8b91ef1f0f2b94dfb7aab4a49a32575cb3e25ed41cd0a2309ed5ade01905598db30675ffbe8b68ece71b6

Malware Config

Targets

    • Target

      063e6fcb607c400d49edb12a44421e504ef93bead5677cc178ce978e9455078c

    • Size

      191KB

    • MD5

      ec1f75e51b841a3d94197b1c2ff387b9

    • SHA1

      d958c3f8d96bdda66830535b73e7cee33d02afe3

    • SHA256

      063e6fcb607c400d49edb12a44421e504ef93bead5677cc178ce978e9455078c

    • SHA512

      a0ebfb772e6d18db25c2ecdd7552e5064c0282e716b8b91ef1f0f2b94dfb7aab4a49a32575cb3e25ed41cd0a2309ed5ade01905598db30675ffbe8b68ece71b6

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks