General

  • Target

    02d81de1a48a06bd3cc4fcd81a550edc42f531be9ae8c7bc56e6bae53187c2f8

  • Size

    191KB

  • Sample

    220212-n5dg3sdgak

  • MD5

    415050c1ccf39194f597730c8c81ca03

  • SHA1

    43d8610ea1630570f0ba5e831ad2f9c48cfcd7da

  • SHA256

    02d81de1a48a06bd3cc4fcd81a550edc42f531be9ae8c7bc56e6bae53187c2f8

  • SHA512

    cfbc61f49712195270bd8312bc53d7859247ba80b9add53773b31a998335691dcf79869d93b43216a51bf082c7f4d95a76c7d3210f44c9f7546fff91d8499739

Malware Config

Targets

    • Target

      02d81de1a48a06bd3cc4fcd81a550edc42f531be9ae8c7bc56e6bae53187c2f8

    • Size

      191KB

    • MD5

      415050c1ccf39194f597730c8c81ca03

    • SHA1

      43d8610ea1630570f0ba5e831ad2f9c48cfcd7da

    • SHA256

      02d81de1a48a06bd3cc4fcd81a550edc42f531be9ae8c7bc56e6bae53187c2f8

    • SHA512

      cfbc61f49712195270bd8312bc53d7859247ba80b9add53773b31a998335691dcf79869d93b43216a51bf082c7f4d95a76c7d3210f44c9f7546fff91d8499739

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks