General

  • Target

    0279708bd8c078afbe4998073b8ca045df9c81971809edafee04c1a5ec33a9cf

  • Size

    99KB

  • Sample

    220212-n97xgscag8

  • MD5

    bf47be29c6c975e59e4e1f1e779bc270

  • SHA1

    c9bd4aa6db351bef277412984942cb0b331707f9

  • SHA256

    0279708bd8c078afbe4998073b8ca045df9c81971809edafee04c1a5ec33a9cf

  • SHA512

    336c4c5c5121ade5219c87b48d0d8284253be903cba9652a04b32d8b97cc975666e3665ccbdc1275bb1a8b2bf55e151aa081f53f746cbaa45a38c0d47d963181

Malware Config

Targets

    • Target

      0279708bd8c078afbe4998073b8ca045df9c81971809edafee04c1a5ec33a9cf

    • Size

      99KB

    • MD5

      bf47be29c6c975e59e4e1f1e779bc270

    • SHA1

      c9bd4aa6db351bef277412984942cb0b331707f9

    • SHA256

      0279708bd8c078afbe4998073b8ca045df9c81971809edafee04c1a5ec33a9cf

    • SHA512

      336c4c5c5121ade5219c87b48d0d8284253be903cba9652a04b32d8b97cc975666e3665ccbdc1275bb1a8b2bf55e151aa081f53f746cbaa45a38c0d47d963181

    • Sakula

      Sakula is a remote access trojan with various capabilities.

    • Sakula Payload

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Enterprise v6

Tasks