General

  • Target

    0300055af8dccb142454575baf8288189626e574712a1a7f8a6b4ed2e08c71ad

  • Size

    192KB

  • Sample

    220212-n3rxpacaa5

  • MD5

    6b4fd814511e5225e359212027a78b08

  • SHA1

    4f1876e96568424d1758dafed8e8c3289ebf9b7d

  • SHA256

    0300055af8dccb142454575baf8288189626e574712a1a7f8a6b4ed2e08c71ad

  • SHA512

    6e22a571a02450d629f7defdf05ee9b89f733c87c112136afff2e6bd82ce76bfe52224e2841d6e99b1bd96389830c228b4be45971ae1785a6c8d3380a223877c

Malware Config

Targets

    • Target

      0300055af8dccb142454575baf8288189626e574712a1a7f8a6b4ed2e08c71ad

    • Size

      192KB

    • MD5

      6b4fd814511e5225e359212027a78b08

    • SHA1

      4f1876e96568424d1758dafed8e8c3289ebf9b7d

    • SHA256

      0300055af8dccb142454575baf8288189626e574712a1a7f8a6b4ed2e08c71ad

    • SHA512

      6e22a571a02450d629f7defdf05ee9b89f733c87c112136afff2e6bd82ce76bfe52224e2841d6e99b1bd96389830c228b4be45971ae1785a6c8d3380a223877c

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks