General

  • Target

    0637b8e46e4b1d39e25d2996bb4bf937592ff26949bd04faed5460615d05e9ca

  • Size

    150KB

  • Sample

    220212-mth3rabda6

  • MD5

    19f6e000b7419f6b6a1c654e2f04253e

  • SHA1

    aee45a18041781fd34a1aef1217751a6e54add5c

  • SHA256

    0637b8e46e4b1d39e25d2996bb4bf937592ff26949bd04faed5460615d05e9ca

  • SHA512

    176ca6fcaa75b6a9a6f21965dc20322797b3e9f0091ee500a162c8ae978ab96e922be4760085a285ad5605820597a8a234bd945e28809a1622ba61cbf2636b4f

Malware Config

Targets

    • Target

      0637b8e46e4b1d39e25d2996bb4bf937592ff26949bd04faed5460615d05e9ca

    • Size

      150KB

    • MD5

      19f6e000b7419f6b6a1c654e2f04253e

    • SHA1

      aee45a18041781fd34a1aef1217751a6e54add5c

    • SHA256

      0637b8e46e4b1d39e25d2996bb4bf937592ff26949bd04faed5460615d05e9ca

    • SHA512

      176ca6fcaa75b6a9a6f21965dc20322797b3e9f0091ee500a162c8ae978ab96e922be4760085a285ad5605820597a8a234bd945e28809a1622ba61cbf2636b4f

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks