General

  • Target

    0603ea7f01bf518ab11717230278e805cd81f2a7255008c5b7e94bb8c936cc44

  • Size

    150KB

  • Sample

    220212-mxf3kabdd8

  • MD5

    0d46e73775f85757e19449ee4c48071e

  • SHA1

    5d1bbb106d56e1c31332f3ab344ff1056112e041

  • SHA256

    0603ea7f01bf518ab11717230278e805cd81f2a7255008c5b7e94bb8c936cc44

  • SHA512

    bc0a32aa46beb9733f0a13410fa1a327200bbf6d5257c7853a0a6829b7f30117aa32782c73c4d31fc5f9b2c8806627977033eabd66f9fecb87929c8c9249b02d

Malware Config

Targets

    • Target

      0603ea7f01bf518ab11717230278e805cd81f2a7255008c5b7e94bb8c936cc44

    • Size

      150KB

    • MD5

      0d46e73775f85757e19449ee4c48071e

    • SHA1

      5d1bbb106d56e1c31332f3ab344ff1056112e041

    • SHA256

      0603ea7f01bf518ab11717230278e805cd81f2a7255008c5b7e94bb8c936cc44

    • SHA512

      bc0a32aa46beb9733f0a13410fa1a327200bbf6d5257c7853a0a6829b7f30117aa32782c73c4d31fc5f9b2c8806627977033eabd66f9fecb87929c8c9249b02d

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks