General

  • Target

    05de185145ee4285f9bf1b20d66b00c49f2ae367320fe98a95b009ee327cd0d3

  • Size

    100KB

  • Sample

    220212-mzmywsbdg7

  • MD5

    ce2ac0eca54a6a9e61a5a0584e43158c

  • SHA1

    1708f300d31ad2b65d865e715c306646b08f5587

  • SHA256

    05de185145ee4285f9bf1b20d66b00c49f2ae367320fe98a95b009ee327cd0d3

  • SHA512

    00ba903ee26ceda173aaf82a2f4f66e9dce3a858d57399d6679466d7ddcd44331b42f31a9763e2dd570325dfa85ca397f64aed3fb85f4487cdd9a22d933586bb

Malware Config

Targets

    • Target

      05de185145ee4285f9bf1b20d66b00c49f2ae367320fe98a95b009ee327cd0d3

    • Size

      100KB

    • MD5

      ce2ac0eca54a6a9e61a5a0584e43158c

    • SHA1

      1708f300d31ad2b65d865e715c306646b08f5587

    • SHA256

      05de185145ee4285f9bf1b20d66b00c49f2ae367320fe98a95b009ee327cd0d3

    • SHA512

      00ba903ee26ceda173aaf82a2f4f66e9dce3a858d57399d6679466d7ddcd44331b42f31a9763e2dd570325dfa85ca397f64aed3fb85f4487cdd9a22d933586bb

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks