General

  • Target

    062fc46363e6c6ed81b50fb34f810c9837978615baf549dba31781ae6c056633

  • Size

    150KB

  • Sample

    220212-mtz19sbda9

  • MD5

    cffc451302b620e732cbb4bbe623681b

  • SHA1

    027301936ec06f22b342457db223bea6f418fa62

  • SHA256

    062fc46363e6c6ed81b50fb34f810c9837978615baf549dba31781ae6c056633

  • SHA512

    bcaa622ee4267c3dfa2be6143d11c564f175d10942219dda4aa51667d8b9cf7144e9b2e62be40b1029028c4d045bec8a67dc7349a721fe66cd718f4c14c897e0

Malware Config

Targets

    • Target

      062fc46363e6c6ed81b50fb34f810c9837978615baf549dba31781ae6c056633

    • Size

      150KB

    • MD5

      cffc451302b620e732cbb4bbe623681b

    • SHA1

      027301936ec06f22b342457db223bea6f418fa62

    • SHA256

      062fc46363e6c6ed81b50fb34f810c9837978615baf549dba31781ae6c056633

    • SHA512

      bcaa622ee4267c3dfa2be6143d11c564f175d10942219dda4aa51667d8b9cf7144e9b2e62be40b1029028c4d045bec8a67dc7349a721fe66cd718f4c14c897e0

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks