General

  • Target

    0302e3d969bd17a024cfa8a2a18063796194cf88a219bf3ee0595a1a11542d9e

  • Size

    35KB

  • Sample

    220212-n3psbscaa4

  • MD5

    1a8948893d495f5a630e660df31209ad

  • SHA1

    4f75d74e2faa95937714a8d1881e22a12121979b

  • SHA256

    0302e3d969bd17a024cfa8a2a18063796194cf88a219bf3ee0595a1a11542d9e

  • SHA512

    be803a83db0408a211d79875d8afa748001841224ef125cc866059533590bb05ccf0c3b631554f1dd955e1df4e01bc917124999c06a1b213838c550463c5b3c8

Malware Config

Targets

    • Target

      0302e3d969bd17a024cfa8a2a18063796194cf88a219bf3ee0595a1a11542d9e

    • Size

      35KB

    • MD5

      1a8948893d495f5a630e660df31209ad

    • SHA1

      4f75d74e2faa95937714a8d1881e22a12121979b

    • SHA256

      0302e3d969bd17a024cfa8a2a18063796194cf88a219bf3ee0595a1a11542d9e

    • SHA512

      be803a83db0408a211d79875d8afa748001841224ef125cc866059533590bb05ccf0c3b631554f1dd955e1df4e01bc917124999c06a1b213838c550463c5b3c8

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks